Categories
Technical
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
-- Database/SQL
-- Multimedia
-- Internet/Networking
-- Operating System
-- Programming
-- Security/Hacking
-- Science/Engineering
-- Web/HTML/CSS/Ajax
-- Unix/Linux
-- Windows
-- Mac OS X
-- Office
-- Perl/PHP/Python
-- C/C++/C#
-- .NET
-- Java
-- Hardware
-- Game Development
-- Embedded Systems
-- Graphics and Design
-- Network Programming
Study
Novel
Nonfiction
Health
Tutorial
Entertainment
Business
Magazine
Arts & Design
Audiobooks & Video Training
Cultures & Languages
Family & Home
Law & Politics
Lyrics & Music
Software Related
eBook Torrents
Uncategorized
Share With Friends
Archive by Date
2012-08-06
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
2012-08-05
2012-08-04
2012-08-03
2012-08-02
2012-08-01
2012-07-31
2012-07-30
2012-07-29
2012-07-28
Search Tag
Artzmania
Johnmarshall
Alejandra
Grob
Hypnosearzt
Photoshp
palestinian
Mapa
Falklands
tisanes
AngryMan
WBEM
Compasionate
Handumdrehen
Submerge
Pistons
Geier
Embroideries
Guidebo
Geurilla
Tubazioni
Amorphis
Perlentiere
Reinhabiting
ORDER
Anosov
Raubkopie
Flashman
2781A
Terezie
Kasturi
Biba
Tunings
sospetto
Atesoglu
Atherosclerosis
SuperHeroes
Sedimentology
Arbeitnehmerbesteuerung
3403
MIRC
Wien
Pectins
Chakravorty
BRIDGE
Cytokeratin
bitchs
Textes
Stupidity
BATTISTA
Newest
Technical Inside the SQL Server Query Optimizer
"Multiplexed Networks for Embedded Systems: CAN, LIN, Flexray, Safe-by-Wire..." by Dominique Paret (Repost)
Dino Esposito, "Building Web Solutions with ASP.Net and ADO.NET" (Repost)
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Power Performance - Multimedia Storytelling for Journalism and Public Relations
pluralsight-training.net SQL Server: Transact-SQL Basic Data Retrieval [2012, ENG]
pluralsight-training.net SQL Server: Collecting and Analyzing Trace Data [2012, ENG]
Pluralsight.net - Introduction to Nancy-JWARE
Technical Structured Programming with C++
Technical Getting Started with LaTeX by David R. Wilkins
Windows A Third Window - Natural Life beyond Newton and Darwin
PLURALSIGHT.NET WINDOWS 8 METRO CONNECTED APPS-JGTiSO
PLURALSIGHT.NET WINDOWS 8 METRO APPLICATION DATA-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C PLUS PLUS AND XAML-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C SHARP AND XAML-JGTiSO
PLURALSIGHT.NET INTRODUCTION TO BUILDING WINDOWS 8 METRO APPLICATIONS-JGTiSO
Multimedia over IP and Wireless Networks - Compression, Networking, and Systems
Interactive Distributed Multimedia Systems and Telecommunication Services
The Art of Hardware Architecture - Design Methods and Techniques for Digital Circuits
Pro/ENGINEER WILDFIRE 5.0 Tutorial and MultiMedia CD
"Multiplexed Networks for Embedded Systems: CAN, LIN, Flexray, Safe-by-Wire..." by Dominique Paret (Repost)
Dino Esposito, "Building Web Solutions with ASP.Net and ADO.NET" (Repost)
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Power Performance - Multimedia Storytelling for Journalism and Public Relations
pluralsight-training.net SQL Server: Transact-SQL Basic Data Retrieval [2012, ENG]
pluralsight-training.net SQL Server: Collecting and Analyzing Trace Data [2012, ENG]
Pluralsight.net - Introduction to Nancy-JWARE
Technical Structured Programming with C++
Technical Getting Started with LaTeX by David R. Wilkins
Windows A Third Window - Natural Life beyond Newton and Darwin
PLURALSIGHT.NET WINDOWS 8 METRO CONNECTED APPS-JGTiSO
PLURALSIGHT.NET WINDOWS 8 METRO APPLICATION DATA-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C PLUS PLUS AND XAML-JGTiSO
PLURALSIGHT.NET BUILDING WINDOWS 8 METRO APPS WITH C SHARP AND XAML-JGTiSO
PLURALSIGHT.NET INTRODUCTION TO BUILDING WINDOWS 8 METRO APPLICATIONS-JGTiSO
Multimedia over IP and Wireless Networks - Compression, Networking, and Systems
Interactive Distributed Multimedia Systems and Telecommunication Services
The Art of Hardware Architecture - Design Methods and Techniques for Digital Circuits
Pro/ENGINEER WILDFIRE 5.0 Tutorial and MultiMedia CD
Useful Links
Technical Shellcoder's Programming Uncovered
Posted on 2010-03-15
|
Shellcoder's Programming Uncovered
Author(s): Kris Kaspersky Publisher: A-List Publishing Date : 2005 Pages : 500 Format : CHM OCR : Yes Quality : Language : English ISBN : 193176946X How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included. About the Author Kris Kaspersky is a technical writer and the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered. Table of Contents Shellcoder's Programming Uncovered Introduction Part I - Introduction to Shellcoding Chapter 1 - Required Tools Chapter 2 - Assembly Language - Quick Start Chapter 3 - Hacking Using GPRS Uncovered Part II - Overflow Errors Chapter 4 - Buffers Subject to Overflow (Lane of Monsters) Chapter 5 - Exploiting SEH Chapter 6 - Specifiers Under Control Chapter 7 - Practical Overflow Example Chapter 8 - Searching for Overflowing Buffers Chapter 9 - Methods of Protecting Buffers Against Overflow Part III - Secrets of Designing Shellcode Chapter 10 - Shellcoding Problems Chapter 11 - The Technique of Writing Portable Shellcode Chapter 12 - Self-Modification Basics Chapter 13 - Playing Hide-and-Seek Under Linux Chapter 14 - Capturing Ring 0 Under Linux Chapter 15 - Compiling and Decompiling Shellcode Part IV - Network Worms and Local Viruses Chapter 16 - Life Cycle of a Worm Chapter 17 - Local Viruses in the UNIX World Chapter 18 - Viruses in Scripts Chapter 19 - ELF Files Chapter 20 - Method of Capturing Control Chapter 21 - Main Symptoms of Virus Infection Chapter 22 - Simplest Windows NT Virus Part V - Firewalls, Honeypots, and Other Protection Systems Chapter 23 - Bypassing Firewalls Chapter 24 - Escaping through the Firewall Chapter 25 - Organizing a Remote Shell Under UNIX and Windows NT Chapter 26 - Hackerz Love Honey Chapter 27 - Sniffing a LAN Chapter 28 - Databases Under Attack Part VI - Exotic Objects for Insertion Chapter 29 - Attacking Bluetooth Chapter 30 - Economizing on GPRS Chapter 31 - Legends and Myths about Flashing BIOS Chapter 32 - Viruses Infecting BIOS CD Description List of Figures List of Tables List of Listings pass: books_for_all _________________ hi im usman ulhaq
Rating:
2.5 out of 5 by Book123 |
Download Links | |
Server | Status |
---|---|
Direct Download Link 1 | Alive |
Direct Download Link 2 | Alive |
Download Link (Download Link 1) | Alive |
Buy This Book at Best Price >> |
Like this article?! Give us +1: