The Shellcoder's Handbook - Discovering And Exploiting Security H...
- Category Other
- Type E-Books
- Language English
- Total size 2.1 MB
- Uploaded By hydr0ponix
- Downloads 153
- Last checked 3 days ago
- Date uploaded 9 years ago
- Seeders 0
- Leechers 0
Infohash : 25EE85099F5C9F8E1E04F66AC7B0C3D54FF45B66
Part 1 - Introduction to Exploitation: Linux on x86
Chapter 1 - Before You Begin
Chapter 2 - Stack Overflows
Chapter 3 - Shellcode
Chapter 4 - Introduction to Format String Bugs
Chapter 5 - Introduction to Heap Overflows
Part 2 - Exploiting More Platforms: Windows, Solaris, and Tru64
Chapter 6 - The Wild World of Windows
Chapter 7 - Windows Shellcode
Chapter 8 - Windows Overflows
Chapter 9 - Overcoming Filters
Chapter 10 - Introduction to Solaris Exploitation
Chapter 11 - Advanced Solaris Exploitation
Chapter 12 - HP Tru64 Unix Exploitation
Part 3 - Vulnerability Discovery
Chapter 13 - Establishing a Working Environment
Chapter 14 - Fault Injection
Chapter 15 - The Art of Fuzzing
Chapter 16 - Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Chapter 17 - Instrumented Investigation: A Manual Approach
Chapter 18 - Tracing for Vulnerabilities
Chapter 19 - Binary Auditing: Hacking Closed Source Software
Part 4 - Advanced Materials
Chapter 20 - Alternative Payload Strategies
Chapter 21 - Writing Exploits that Work in the Wild
Chapter 22 - Attacking Database Software
Chapter 23 - Kernel Overflows
Chapter 24 - Exploiting Kernel Vulnerabilities
Files:
- The Shellcoder's Handbook - Discovering And Exploiting Security Holes (2004).chm (2.1 MB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.publicbt.com:80/announce