did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470198827

The Shellcoder's Handbook: Discovering and Exploiting Security Holes, 2nd Edition

by ; ; ;
  • ISBN13:

    9780470198827

  • ISBN10:

    0470198826

  • Format: eBook
  • Copyright: 2007-11-01
  • Publisher: Wiley
  • Purchase Benefits
List Price: $49.99
We're Sorry.
No Options Available at This Time.

Summary

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files

Table of Contents

About the Authors
Acknowledgments
Introduction to the Second Edition
Introduction to Exploitation: Linux on x86
Before You Begin
Stack Overflows
Shellcode
Introduction to Format String Bugs
Introduction to Heap Overflows
Other PlatformsùWindows, Solaris, OS/X, and Cisco
The Wild World of Windows
Windows Shellcode
Windows Overflows
Overcoming Filters
Introduction to Solaris Exploitation
Advanced Solaris Exploitation
OS X Shellcode
Cisco IOS Exploitation
Protection Mechanisms
Vulnerability Discovery
Establishing a Working Environment
Fault Injection
The Art of Fuzzing
Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Instrumented Investigation: A Manual Approach
Tracing for Vulnerabilities
Binary Auditing: Hacking Closed Source Software
Advanced Materials
Alternative Payload Strategies
Writing Exploits that Work in the Wild
Attacking Database Software
Unix Kernel Overflows
Exploiting Unix Kernel Vulnerabilities
Hacking the Windows Kernel
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program