Writing security tools and exploits:
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Foster, James C. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, MA Syngress ©2006
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:Includes bibliographical references and index
Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts
Beschreibung:1 Online-Ressource
ISBN:0080493130
1423754980
1597499978
9780080493138
9781423754985
9781597499972

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen