The Shellcoder Handbook Discovering and Exploiting Security Holes 2nd edition by Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte – Ebook PDF Instant Download/Delivery.9780470198827, 0470198826
Full download The Shellcoder Handbook Discovering and Exploiting Security Holes 2nd edition after payment
Product details:
ISBN 10: 0470198826
ISBN 13: 9780470198827
Author: Chris Anley; John Heasman; Felix Lindner; Gerardo Richarte
The Shellcoder Handbook Discovering and Exploiting Security Holes 2nd Table of contents:
Part I
Introduction to Exploitation: Linux on x86
Chapter 1
Before You Begin
Basic Concepts
Memory Management
Assembly
Recognizing C and C++ Code Constructs in Assembly
Conclusion
Chapter 2
Stack Overflows
Buffers
The Stack
Functions and the Stack
Overflowing Buffers on the Stack
Controlling EIP
An Interesting Diversion
Using an Exploit to Get Root Privileges
The Address. Problem The NOP Method
Defeating a Non-Executable Stack
Return to libc
Conclusion
Chapter 3
Shellcode
Understanding System Calls
Writing Shellcode for the exit() Syscall
Injectable Shellcode
Spawning a Shell
Conclusion
Chapter 4
Introduction to Format String Bugs
Prerequisites
What Is a Format String?
What Is a Format String Bug?
Format String Exploits
Crashing Services
Information Leakage
Controlling Execution for Exploitation
Why Did This Happen?
Format String Technique Roundup
Conclusion
Chapter 5
Introduction to Heap Overflows
What Is a Heap?
How a Heap Works
Finding Heap Overflows
Basic Heap Overflows
People also search for The Shellcoder Handbook Discovering and Exploiting Security Holes 2nd:
the shellcoder’s handbook discovering and exploiting security holes 2nd edition
the shellcoder’s handbook discovering and exploiting security holes pdf download
the shellcoder’s handbook
the shellcoder’s handbook 3rd edition pdf