Shellcoders Programming Uncovered (Uncovered series)

Chapter 3: Hacking Using GPRS Uncovered

Table 3.1: Approximate format of the information stored in NAM
Table 3.2: Main types of memory chips used by manufacturers of cellular phones

Chapter 6: Specifiers Under Control

Table 6.1: Main functions for formatted input and output with brief descriptions

Chapter 8: Searching for Overflowing Buffers

Table 8.1: Potentially dangerous functions of the standard C library

Chapter 11: The Technique of Writing Portable Shellcode

Table 11.1: Different methods of searching for addresses of API functions

Chapter 16: Life Cycle of a Worm

Table 16.1: Top ten network worms

Chapter 18: Viruses in Scripts

Table 18.1: Typical indications of virus presence

Chapter 28: Databases Under Attack

Table 28.1: Main SQL commands
Table 28.2: Ports tracked by different database servers

Категории