Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

Chapter 4: Introduction to Format String Bugs

Table 4.1: Writing to Addresses

Chapter 10: Introduction to Solaris Exploitation

Table 10.1: Global Registers and Purposes
Table 10.2: Register Names and Purposes
Table 10.3: Effects of a save Instruction
Table 10.4: Effects of a restore Instruction
Table 10.5: Useful System Calls and Associated Numbers
Table 10.6: NOP Alternatives
Table 10.7: Memory Management on Solaris
Table 10.8: Saved Register Windows Layout on the Stack
Table 10.9: Required TREE Structure for a Reciprocal Write
Table 10.10: Structure of a Small malloc Chunk

Chapter 12: HP Tru64 Unix Exploitation

Table 12.1: Tru64 General Purpose Registers
Table 12.2: Alpha Instructions for Assembling Payload Components

Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages

Table 16.1: Integer Conversion Table

Chapter 20:   Alternative Payload Strategies

Table 20.1: How a Syscall Proxy Works
Table 20.2: Overview of the Syscall Proxy

Категории