Shellcoder's Handbook

The Shellcoder’s Handbook: Discovering & Exploiting Security Holes PDF

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again. A unique author team-a a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system. Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques.

Table of Contents

About the Authors; Credits; Acknowledgments; Part; 1: Introduction to Exploitation: Linux on x86; Chapter; 1: Before You Begin; Chapter; 2: Stack Overflows; Chapter 3: Shellcode; Chapter 4: Introduction to Format String Bugs; Chapter 5: Introduction to Heap Overflows. Part; 2: Exploiting More Platforms: Windows, Solaris, and Tru64; Chapter 6: The Wild World of Windows; Chapter 7: Windows Shellcode; Chapter 8: Windows Overflows; Chapter 9: Overcoming Filters; Chapter; 10: Introduction to Solaris Exploitation; Chapter; 11: Advanced Solaris Exploitation; Chapter; 12: HP Tru64 Unix Exploitation. Part 3: Vulnerability Discovery; Chapter; 13: Establishing a Working Environment; Chapter; 14: Fault Injection; Chapter; 15: The Art of Fuzzing; Chapter; 16: Source Code Auditing: Finding Vulnerabilities in C-based Languages; Chapter; 17: Instrumented Investigation: A Manual Approach; Chapter; 18: Tracing for Vulnerabilities; Chapter; 19: Binary Auditing: Hacking Closed Source Software. Part 4: Advanced Materials; Chapter; 20: Alternative Payload Strategies; Chapter; 21: Writing Exploits that Work in the Wild; Chapter; 22: Attacking Database Software; Chapter; 23: Kernel Overflows; Chapter; 24: Exploiting Kernel Vulnerabilities; Index.


Disclaimer

The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks.

DMCA takedown cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links to 3rd party websites where these books can be downloaded.

Product descriptions and product images are used under fair use (Educational).

Download: https://mega.nz/#!6vZC2SSK!FdyTtyWu9q7A5JenujG1M9tToEYFfBEB1nO5YuMzKPo

Spread the love

Subscribe to our mailing list.

yoast seo premium free