Writing security tools and exploits:
Gespeichert in:
Bibliographische Detailangaben
Beteilige Person: Foster, James C. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Rockland, MA Syngress ©2006
Schlagwörter:
Links:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149589
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149589
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=149589
Beschreibung:Includes bibliographical references and index
Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts
Umfang:1 Online-Ressource
ISBN:0080493130
1423754980
1597499978
9780080493138
9781423754985
9781597499972