Sign In | Not yet a member? | Submit your article
 
Home   Technical   Study   Novel   Nonfiction   Health   Tutorial   Entertainment   Business   Magazine   Arts & Design   Audiobooks & Video Training   Cultures & Languages   Family & Home   Law & Politics   Lyrics & Music   Software Related   eBook Torrents   Uncategorized  
Letters: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Date: 06 May 2011, 19:21
Elite Programming Techniques Demystified
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.
"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure
* Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.
* Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.
* Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!
* Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.
* Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.
* Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.
* Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.
* Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.
* Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:
A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page
"From the Author" Forum where the authors post timely updates and links to related sites
The complete code listings from the book
Downloadable chapters from these best-selling books:
Buffer Overflow Attacks: Detect, Exploit, Prevent
Programmer's Ultimate Security DeskRef
Hacking the Code: ASP.NET Web Application Security
Nessus Network Auditing
TABLE OF CONTENTS:
Security Coding
NASL Scripting
BSD Sockets
Windows Sockets (Winsock)
Java Sockets
Writing Portable Code
Portable Network Programming
Writing Shellcode (I and II)
Writing Exploits (I, II, and III)
Writing Security Components
Creating a Web Security Tool
Glossary
Security Tool Compendium
Exploit Archives
Syscall Reference
Data Conversion Reference
PassWord: www.freebookspot.com

DISCLAIMER:

This site does not store Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals on its server. We only index and link to Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals provided by other sites. Please contact the content providers to delete Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals if any and email us, we'll remove relevant links or contents immediately.



Comments

Comments (0) All

Verify: Verify

    Sign In   Not yet a member?


Popular searches