Shellcoders Programming Uncovered (Uncovered series)

Following are select files from this book's Companion CD-ROM. These files are for your personal use, are governed by the Books24x7 Membership Agreement, and are copyright protected by the publisher, author, and/or other third parties. Unauthorized use, reproduction, or distribution is strictly prohibited .

Click on the link(s) below to download the files to your computer:

File

Description

Size

 All  CD  Content

Shellcoder s Programming Uncovered

6,767,551

     

 Chapter 1:

Required Tools

346,189

 Chapter 3:

Hacking Using GPRS Uncovered

455,545

 Chapter 4:

Buffers Subject to Overflow (Lane of Monsters)

38,202

 Chapter 5:

Exploiting SEH

5,697

 Chapter 6:

Specifiers Under Control

72,924

 Chapter 7:

Practical Overflow Example

79,706

 Chapter 8:

Searching for Overflowing Buffers

159,968

 Chapter 9:

Methods of Protecting Buffers Against Overflow

24,120

 Chapter 10:

Shellcoding Problems

34,831

 Chapter 12:

Self-Modification Basics

66,514

 Chapter 13:

Playing Hide-and-Seek Under Linux

769,139

 Chapter 14:

Capturing Ring 0 Under Linux

1,064

 Chapter 15:

Compiling and Decompiling Shellcode

303,696

 Chapter 16:

Life Cycle of a Worm

110,694

 Chapter 17:

Local Viruses in the UNIX World

6,850

 Chapter 19:

ELF Files

183,802

 Chapter 21:

Main Symptoms of Virus Infection

91,288

 Chapter 22:

Simplest Windows NT Virus

29,259

 Chapter 23:

Bypassing Firewalls

62,560

 Chapter 24:

Escaping through the Firewall

268,057

 Chapter 26:

Hackerz Love Honey

7,847

 Chapter 27:

Sniffing a LAN

299,883

 Chapter 28:

Databases Under Attack

87,822

 Chapter 29:

Attacking Bluetooth

1,263,635

 Chapter 30:

Economizing on GPRS

1,235,428

 Chapter 31:

Legends and Myths about Flashing BIOS

178,099

 Chapter 32:

Viruses Infecting BIOS

111,117

 Kit

 

78,108

 Src

 

210,634

 Other  Content  -  1

 

1,720

Категории