Wonder Club world wonders pyramid logo
×

The Shellcoder's Handbook: Discovering and Exploiting Security Holes Book

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, <ul>
<li>Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again</li>
<li>A unique author team-, The Shellcoder's Handbook: Discovering and Exploiting Security Holes has a rating of 3.5 stars
   2 Ratings
X
The Shellcoder's Handbook: Discovering and Exploiting Security Holes,
  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again
  • A unique author team-, The Shellcoder's Handbook: Discovering and Exploiting Security Holes
    3.5 out of 5 stars based on 2 reviews
5
0 %
4
50 %
3
50 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Written by author Jack Koziol
  • Published by Wiley, John & Sons, Incorporated, March 2004
  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-
  • Uncover, exploit, and close security holes in any software or operating system Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacke
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

About the authors
Credits
Acknowledgments
Pt. 1Introduction to exploitation : Linux on x861
Ch. 1Before you begin3
Ch. 2Stack overflows11
Ch. 3Shellcode35
Ch. 4Introduction to format string bugs55
Ch. 5Introduction to heap overflows83
Pt. 2Exploiting more platforms : Windows, Solaris, and Tru64103
Ch. 6The wild world of Windows105
Ch. 7Windows Shellcode123
Ch. 8Windows overflows149
Ch. 9Overcoming filters197
Ch. 10Introduction to Solaris exploitation215
Ch. 11Advanced Solaris exploitation269
Ch. 12HP Tru64 Unix exploitation301
Pt. 3Vulnerability discovery331
Ch. 13Establishing a working environment333
Ch. 14Fault injection349
Ch. 15The art of fuzzing363
Ch. 16Source code auditing : finding vulnerabilities in C-based languages383
Ch. 17Instrumented investigation : a manual approach405
Ch. 18Tracing for vulnerabilities427
Ch. 19Binary auditing : hacking closed source software451
Pt. 4Advanced materials473
Ch. 20Alternative payload strategies475
Ch. 21Writing exploits that work in the wild499
Ch. 22Attacking database software509
Ch. 23Kernel overflows529
Ch. 24Exploiting kernel vulnerabilities549
Index581


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

The Shellcoder's Handbook: Discovering and Exploiting Security Holes, <ul>
<li>Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again</li>
<li>A unique author team-, The Shellcoder's Handbook: Discovering and Exploiting Security Holes

X
WonderClub Home

This item is in your Collection

The Shellcoder's Handbook: Discovering and Exploiting Security Holes, <ul>
<li>Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again</li>
<li>A unique author team-, The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

X
WonderClub Home

This Item is in Your Inventory

The Shellcoder's Handbook: Discovering and Exploiting Security Holes, <ul>
<li>Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again</li>
<li>A unique author team-, The Shellcoder's Handbook: Discovering and Exploiting Security Holes

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: