ShopSpell

The Shellcoder's Handbook: Discovering and Exploiting Security Holes [Paperback]

$33.99     $52.00   35% Off     (Free Shipping)
15 available
  • Category: Books (Computers)
  • Author:  Anley, Chris, Heasman, John, Lindner, Felix, Richarte, Gerardo
  • Author:  Anley, Chris, Heasman, John, Lindner, Felix, Richarte, Gerardo
  • ISBN-10:  047008023X
  • ISBN-10:  047008023X
  • ISBN-13:  9780470080238
  • ISBN-13:  9780470080238
  • Publisher:  Wiley
  • Publisher:  Wiley
  • Pages:  752
  • Pages:  752
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Jun-2007
  • Pub Date:  01-Jun-2007
  • SKU:  047008023X-11-SPLV
  • SKU:  047008023X-11-SPLV
  • Item ID: 100605817
  • List Price: $52.00
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Dec 01 to Dec 03
  • Notes: Brand New Book. Order Now.

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking unbreakable software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
  • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
  • The companion Web site features downloadable code files
About the Authors.

Acknowledgments.

Introduction to the Second Edition.

Part I: Introduction to Exploitation: Linux on x86.

Chapter 1: Before You Begin.

Chapter 2: Stack Overflows.

Chapter 3: Shellcode.

Chapter 4: Introduction to Format String Bugs.

Chapter 5: Introduction to Heap Overflows.

Part II: Other Platforms—Windows, Solaris, OS/X, and Cisco.

Chapter 6: The Wild World of Windows.

Chapter 7: Windows Shellcode.

Chapter 8: Windows Overflows.

Chapter 9: Overcoming Filters.

Chapter 10: Introduction to Solaris Exploitation.

Chapter 11: Advanced Solaris Exploitation.

Chapter 12: OS X Shellcode.

Chapter 13: Cisco IOS Exploitation.

Chapter 14: Protection Mechanisms.

Part III: Vulnerability Discovery.

Chapter 15: Establishing a Working Environment.

Chapter 16: Fault Injection.

Chapter 17: The Art lãœ

Add Review