Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
| | ||
| | | |
| | ||
Chapter 4: Introduction to Format String Bugs
- Table 4.1: Writing to Addresses
Chapter 10: Introduction to Solaris Exploitation
- Table 10.1: Global Registers and Purposes
- Table 10.2: Register Names and Purposes
- Table 10.3: Effects of a save Instruction
- Table 10.4: Effects of a restore Instruction
- Table 10.5: Useful System Calls and Associated Numbers
- Table 10.6: NOP Alternatives
- Table 10.7: Memory Management on Solaris
- Table 10.8: Saved Register Windows Layout on the Stack
- Table 10.9: Required TREE Structure for a Reciprocal Write
- Table 10.10: Structure of a Small malloc Chunk
Chapter 12: HP Tru64 Unix Exploitation
- Table 12.1: Tru64 General Purpose Registers
- Table 12.2: Alpha Instructions for Assembling Payload Components
Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages
- Table 16.1: Integer Conversion Table
Chapter 20: Alternative Payload Strategies
- Table 20.1: How a Syscall Proxy Works
- Table 20.2: Overview of the Syscall Proxy
| | ||
| | | |
| | ||
| | ||
| | ||