Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  

Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Date: 08 May 2011, 01:26

Free Download Now     Free register and download UseNet downloader, then you can FREE Download from UseNet.

    Download without Limit " Shellcoder's Programming Uncovered " from UseNet for FREE!
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.
About the Author
Kris Kaspersky is a technical writer and the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered.
Table of Contents
Shellcoder's Programming Uncovered
Introduction
Part I - Introduction to Shellcoding
Chapter 1 - Required Tools
Chapter 2 - Assembly Language - Quick Start
Chapter 3 - Hacking Using GPRS Uncovered
Part II - Overflow Errors
Chapter 4 - Buffers Subject to Overflow (Lane of Monsters)
Chapter 5 - Exploiting SEH
Chapter 6 - Specifiers Under Control
Chapter 7 - Practical Overflow Example
Chapter 8 - Searching for Overflowing Buffers
Chapter 9 - Methods of Protecting Buffers Against Overflow
Part III - Secrets of Designing Shellcode
Chapter 10 - Shellcoding Problems
Chapter 11 - The Technique of Writing Portable Shellcode
Chapter 12 - Self-Modification Basics
Chapter 13 - Playing Hide-and-Seek Under Linux
Chapter 14 - Capturing Ring 0 Under Linux
Chapter 15 - Compiling and Decompiling Shellcode
Part IV - Network Worms and Local Viruses
Chapter 16 - Life Cycle of a Worm
Chapter 17 - Local Viruses in the UNIX World
Chapter 18 - Viruses in Scripts
Chapter 19 - ELF Files
Chapter 20 - Method of Capturing Control
Chapter 21 - Main Symptoms of Virus Infection
Chapter 22 - Simplest Windows NT Virus
Part V - Firewalls, Honeypots, and Other Protection Systems
Chapter 23 - Bypassing Firewalls
Chapter 24 - Escaping through the Firewall
Chapter 25 - Organizing a Remote Shell Under UNIX and Windows NT
Chapter 26 - Hackerz Love Honey
Chapter 27 - Sniffing a LAN
Chapter 28 - Databases Under Attack
Part VI - Exotic Objects for Insertion
Chapter 29 - Attacking Bluetooth
Chapter 30 - Economizing on GPRS
Chapter 31 - Legends and Myths about Flashing BIOS
Chapter 32 - Viruses Infecting BIOS
CD Description
List of Figures
List of Tables
List of Listings
PassWord: books_for_all

DISCLAIMER:

This site does not store Shellcoder's Programming Uncovered on its server. We only index and link to Shellcoder's Programming Uncovered provided by other sites. Please contact the content providers to delete Shellcoder's Programming Uncovered if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches