Writing Security Tools and Exploits
James C. Foster, Vincent T. Liu
- 出版商: Syngress Media
- 出版日期: 2006-02-25
- 售價: $2,170
- 貴賓價: 9.5 折 $2,062
- 語言: 英文
- 頁數: 650
- 裝訂: Paperback
- ISBN: 1597499978
- ISBN-13: 9781597499972
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$650$553 -
$2,680$2,546 -
$490$417 -
$490$417 -
$149$149 -
$680Buffer Overflow Attacks
-
$480$379 -
$2,170$2,062 -
$750$638 -
$620Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications
-
$1,264Linux Network Security
-
$880$581 -
$1,840$1,748 -
$199Foundations of Ajax (Paperback)
-
$580$458 -
$2,170$2,062 -
$780$702 -
$3,026$2,875 -
$2,450$2,328 -
$650$507 -
$480$456 -
$450$356 -
$620$490 -
$490$382 -
$1,750$1,663
相關主題
商品描述
Description
Learn to Write the Security Tools the Other Books Only Teach You to Use
Exploits. In information technology circles, the term exploits has become synonymous with vulnerabilities. It is a scary word that can keep you up at night wondering if you have purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and patched your entire environment. It’s also a topic that can enter the security water-cooler discussions faster than McAfee’s new wicked antivirus software or Symantec’s latest acquisition. Exploits are proof that the computer science or software programming community still does not have an understanding of how to design, create, and implement secure code.
·
Write Solid Shellcode
Learn the
techniques used to make the most out of vulnerabilities by employing the correct
shellcode.
·
Reverse Connection Shellcode
See how
reverse connection shellcode makes a connection from a hacked system to a
different system where it can be caught using network tools such as netcat.
·
Buffer Overflow Exploits
Find
techniques to protect against buffer overflows such as allocating
buffers for string operations dynamically on the heap.
·
Heap Overflows
Heap overflows have
become the most prominent software security bugs. See how they can have varying
exploitation techniques and consequences.
·
Format Strings
Format string
vulnerabilities occur when programmers pass externally supplied data to a printf function (or similar) as part of
the format string argument.
·
Race Conditions
Nearly all race
condition exploits are written from a local attacker’s perspective and have the
potential to escalate privileges, overwrite files, or compromise protected
data.
·
Exploitable Integer Bugs
See how
integer bugs are harder for a researcher to spot than stack overflow
vulnerabilities and learn why the implications of integer calculation errors are
less understood by developers as a whole.
·
Code for Nessus
Use NASLs to check
for security vulnerabilities or misconfigurations.
·
Metasploit Framework (MSF)
Use MSF
and its components, msfweb, msfconsole, and msfcli, as an exploitation
platform.
·
Meterpreter Extensions
Use the power
of the Meterpreter payload system to load custom-written DLLs into an exploited
process’s address space.