PDA

View Full Version : The Shellcoder's Handbook: Discovering and Exploiting Security Holes (Paperback)



SheLLniX
21-10-2007, 11:50 PM
http://pic.citecclub.org/out.php/i560_cover.JPG

PART 1 INTRO TO EXPLOITATION ON LINUX x86

1) Before You Begin
2) Stack Overflows
3) Shellcode
4) Introduction to Format String Bugs
5) Introduction to Heap Overflows

PART 2 EXPLOITING MORE PLATFORMS: Windows, Solaris, and Tru64

6) The Wild World of Windows
7) Windows Shellcode
8) Windows Overflows
9) Overcoming Filters
10) Introduction to Solaris Exploitation
11) Advanced Solaris Exploitation
12) HP Tru64 Unix Exploitation

PART 3 VULNERABILITY DISCOVERY

13) Establishing a Working Environment
14) Falut Injection
15) The Art of Fuzzing
16) Souce Code Auditing: Finding Vulnerabilities in C-based Languages
17) Instrumented Investigation: A manual approach
18) Tracing for Vulnerabilities
19) Binary Auditing: Hacking Closed Source Software

PART 4 ADVANCED MATERIALS

20) Alternative Payload Strategies
21) Writing Exploits that Work in the Wild
22) Attacking Database Software
23) Kernel Overflows
24) Exploiting Kernel Vulnerabilities

This is not just another security book! The wizards from bugtraq have shared a significant portion of their craft and tools with us in this book. For that, I am most grateful. Given the technical prowess of many of the authors, I was pleasantly supprised by their willingness and ability to explain concepts in very detailed, clear, and concise manner.

After spending some time with this book, I became somewhat disappointed by the number of errors it contains. A few solid technical reviewers could have easily caught these errors and made the end product much better. Another disappoint is that all of the stuff that the book promises at the website still hasn't appeared.

This book is not for beginners. This book assumes reasonable competence with C, Assemply, and computer architecture... all at an intermediate level.

This book stands out for the info it provides. Other books have tease and hint at some of these concepts for maybe a sentence or two, but they never truly explain any of them. It's rare to find explanations of this material. There is no fluff and no confusion (except for errors in the examples). This is well done, and a joy to read. It is the definitivie text book for students of vulnerability discovery.

# Paperback: 718 pages
# Publisher: Wiley; 2 edition (August 20, 2007)
# Language: English
# ISBN-10: 047008023X
# ISBN-13: 978-0470080238
# Product Dimensions: 9.1 x 7.4 x 1.6 inches
# Shipping Weight: 2.4 pounds

CITEC File Hosting
**Hidden Content: Check the thread to see hidden data.**

pspn.n
22-10-2007, 08:45 AM
เยี่ยมมากครับ เป็นหนังสือที่ดีอีกเล่มทีเดียว สำหรับผู้ที่ต้องการเขียน exploit เอง : )
ขอบคุณมากครับ