Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)

The Shellcoder's Handbook: Discovering and Exploiting Security

Holes by Jack Koziol et al.

John Wiley & Sons 2004 (644 pages)

ISBN:0764544683

Stop hackers from wreaking havoc on your software applications and operating systems. This innovative book provides tools to discover vulnerabilities in C-language-based software, exploit what you find, and prevent new security holes from occurring.

Table of Contents
The Shellcoder's Handbook ”Discovering and Exploiting Security Holes
Part 1 - Introduction to Exploitation: Linux on x86
Chapter 1 - Before You Begin
Chapter 2 - Stack Overflows
Chapter 3 - Shellcode
Chapter 4 - Introduction to Format String Bugs
Chapter 5 - Introduction to Heap Overflows
Part 2 - Exploiting More Platforms: Windows, Solaris, and Tru64
Chapter 6 - The Wild World of Windows
Chapter 7 - Windows Shellcode
Chapter 8 - Windows Overflows
Chapter 9 - Overcoming Filters
Chapter 10 - Introduction to Solaris Exploitation
Chapter 11 - Advanced Solaris Exploitation
Chapter 12 - HP Tru64 Unix Exploitation
Part 3 - Vulnerability Discovery
Chapter 13 - Establishing a Working Environment
Chapter 14 - Fault Injection
Chapter 15 - The Art of Fuzzing
Chapter 16 - Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Chapter 17 - Instrumented Investigation: A Manual Approach
Chapter 18 - Tracing for Vulnerabilities
Chapter 19 - Binary Auditing: Hacking Closed Source Software
Part 4 - Advanced Materials
Chapter 20 -    Alternative Payload Strategies
Chapter 21 - Writing Exploits that Work in the Wild
Chapter 22 - Attacking Database Software
Chapter 23 - Kernel Overflows
Chapter 24 - Exploiting Kernel Vulnerabilities
Index
List of Figures
List of Tables
List of Sidebars

Категории