Sold Out
Book Categories |
About the authors | ||
Credits | ||
Acknowledgments | ||
Pt. 1 | Introduction to exploitation : Linux on x86 | 1 |
Ch. 1 | Before you begin | 3 |
Ch. 2 | Stack overflows | 11 |
Ch. 3 | Shellcode | 35 |
Ch. 4 | Introduction to format string bugs | 55 |
Ch. 5 | Introduction to heap overflows | 83 |
Pt. 2 | Exploiting more platforms : Windows, Solaris, and Tru64 | 103 |
Ch. 6 | The wild world of Windows | 105 |
Ch. 7 | Windows Shellcode | 123 |
Ch. 8 | Windows overflows | 149 |
Ch. 9 | Overcoming filters | 197 |
Ch. 10 | Introduction to Solaris exploitation | 215 |
Ch. 11 | Advanced Solaris exploitation | 269 |
Ch. 12 | HP Tru64 Unix exploitation | 301 |
Pt. 3 | Vulnerability discovery | 331 |
Ch. 13 | Establishing a working environment | 333 |
Ch. 14 | Fault injection | 349 |
Ch. 15 | The art of fuzzing | 363 |
Ch. 16 | Source code auditing : finding vulnerabilities in C-based languages | 383 |
Ch. 17 | Instrumented investigation : a manual approach | 405 |
Ch. 18 | Tracing for vulnerabilities | 427 |
Ch. 19 | Binary auditing : hacking closed source software | 451 |
Pt. 4 | Advanced materials | 473 |
Ch. 20 | Alternative payload strategies | 475 |
Ch. 21 | Writing exploits that work in the wild | 499 |
Ch. 22 | Attacking database software | 509 |
Ch. 23 | Kernel overflows | 529 |
Ch. 24 | Exploiting kernel vulnerabilities | 549 |
Index | 581 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionThe Shellcoder's Handbook: Discovering and Exploiting Security Holes
X
This Item is in Your InventoryThe Shellcoder's Handbook: Discovering and Exploiting Security Holes
X
You must be logged in to review the productsX
X
X
Add
The Shellcoder's Handbook: Discovering and Exploiting Security Holes,
X
X
Add
The Shellcoder's Handbook: Discovering and Exploiting Security Holes,
|