The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

by ; ; ;
Format: eBook
Pub. Date: 2007-11-01
Publisher(s): Wiley
Availability: This title is currently not available.
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $52.49

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files

Table of Contents

About the Authors
Acknowledgments
Introduction to the Second Edition
Introduction to Exploitation: Linux on x86
Before You Begin
Stack Overflows
Shellcode
Introduction to Format String Bugs
Introduction to Heap Overflows
Other PlatformsùWindows, Solaris, OS/X, and Cisco
The Wild World of Windows
Windows Shellcode
Windows Overflows
Overcoming Filters
Introduction to Solaris Exploitation
Advanced Solaris Exploitation
OS X Shellcode
Cisco IOS Exploitation
Protection Mechanisms
Vulnerability Discovery
Establishing a Working Environment
Fault Injection
The Art of Fuzzing
Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Instrumented Investigation: A Manual Approach
Tracing for Vulnerabilities
Binary Auditing: Hacking Closed Source Software
Advanced Materials
Alternative Payload Strategies
Writing Exploits that Work in the Wild
Attacking Database Software
Unix Kernel Overflows
Exploiting Unix Kernel Vulnerabilities
Hacking the Windows Kernel
Index
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.