Warenkorb
Kostenloser Versand
Unsere Operationen sind klimaneutral

The Shellcoder's Handbook Jack Koziol

The Shellcoder's Handbook von Jack Koziol

The Shellcoder's Handbook Jack Koziol


10.50
Zustand - Sehr Gut
Nur noch 3

Zusammenfassung

Find out where security holes come from and how to close them so they never occur again. This book pinpoints vulnerabilities in popular operating systems and applications and shows the reader how to write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken.

The Shellcoder's Handbook Zusammenfassung

The Shellcoder's Handbook: Discovering and Exploiting Security Holes Jack Koziol

* Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again * A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system * Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques

The Shellcoder's Handbook Bewertungen

...80 per cent...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed... (PC Utilities, July 2004) ...essential for administrators who want to secure computer systems under their management... (Computer Weekly, March 2004) ...has caused some raised eyebrows in the technical community... (www infoworld.com, 17 March 2004)

Über Jack Koziol

Jack Koziol, the lead author of The Shellcoder's Handbook, is a Senior Instructor and Security Program Manager at InfoSec Institute, a provider of advanced ethical hacking training. He regularly is called upon to train members of the United States intelligence community, military, and federal law enforcement agencies. Additionally, Jack provides training for Fortune 500 companies, such as Microsoft, HP, and Citibank, on how to better secure their networks and applications. When not teaching hacking classes, Jack regularly performs penetration tests and application security assessments for a number of clients. He has years of private vulnerability development and exploitation experience for his customers and himself. Jack is also the author of Intrusion Detection with Snort, one of the best-selling security books in its first year of publication (2003). The book has been translated into several languages, including French and Japanese, and has received rave reviews from Linux Journal, Slashdot, and Information Security magazine. Jack has appeared in USA Today, CNN, MSNBC, First Business, and other media outlets for his expert opinions on information security. He lives in Oak Park, Illinois, in the shadow of Frank Lloyd Wright's home and studio, with his girlfriend Tracy and dog Quasi. David Litchfield is the world's leading computer security vulnerability researcher and one of the five founding members of NGSSoftware. David has discovered and published over 100 major security vulnerabilities in many different products, including most notably Apache, Microsoft Internet Information Server, Oracle, and Microsoft SQL Server. With his vast experience of network and application penetration testing, David is a permanent presenter to the Black Hat Briefings. He is also the lead author of SQL Security (Osborne/ McGraw-Hill). Dave Aitel is the author of SPIKE and the founder of the NYC-based Internet security company Immunity, Inc. His research has incorporated exploitation of both Windows and Unix vulnerabilities, and advanced methodologies for finding new vulnerabilities. Chris Anley is a Director of Next Generation Security Software, a U.K.-based security consulting, research, and software company. Chris is actively involved in vulnerability research and has published several white papers and security advisories on a number of products, including PGP, Windows, SQL Server, and Oracle. He splits his time evenly between research, coding, consulting, and drinking, and hopes at some point to add sleeping to the list. Sinan Eren is a security researcher based in the Bay Area. He has done extensive work regarding exploitation of Unix vulnerabilities, developed advanced and robust methodologies for exploiting Kernel-level holes, and found many high-profile bugs in commercial and open source Unix software. Neel Mehta works as an application vulnerability researcher at ISS X-Force, and, like many other security researchers, comes from a reverse-engineering background. His reverse-engineering experience was cultivated through extensive consulting work in the copy protection field, and has more recently been focused on application security. Neel has done extensive research into binary and source-code auditing and has applied this knowledge to find many vulnerabilities in critical and widely deployed network applications. Riley Hassell, a Senior Researcher Engineer at eEye Digital Security, is responsible for the design and implementation of eEye Digital Security's QA and research tool suite. He is responsible for the discovery of several highly exposed vulnerabilities released by eEye Digital Security.

Inhaltsverzeichnis

About the Authors; Credits; Acknowledgments; Part; 1: Introduction to Exploitation: Linux on x86; Chapter; 1: Before You Begin; Chapter; 2: Stack Overflows; Chapter 3: Shellcode; Chapter 4: Introduction to Format String Bugs; Chapter 5: Introduction to Heap Overflows. Part; 2: Exploiting More Platforms: Windows, Solaris, and Tru64; Chapter 6: The Wild World of Windows; Chapter 7: Windows Shellcode; Chapter 8: Windows Overflows; Chapter 9: Overcoming Filters; Chapter; 10: Introduction to Solaris Exploitation; Chapter; 11: Advanced Solaris Exploitation; Chapter; 12: HP Tru64 Unix Exploitation. Part 3: Vulnerability Discovery; Chapter; 13: Establishing a Working Environment; Chapter; 14: Fault Injection; Chapter; 15: The Art of Fuzzing; Chapter; 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages; Chapter; 17: Instrumented Investigation: A Manual Approach; Chapter; 18: Tracing for Vulnerabilities; Chapter; 19: Binary Auditing: Hacking Closed Source Software. Part 4: Advanced Materials; Chapter; 20: Alternative Payload Strategies; Chapter; 21: Writing Exploits that Work in the Wild; Chapter; 22: Attacking Database Software; Chapter; 23: Kernel Overflows; Chapter; 24: Exploiting Kernel Vulnerabilities; Index.

Zusätzliche Informationen

GOR002105280
9780764544682
0764544683
The Shellcoder's Handbook: Discovering and Exploiting Security Holes Jack Koziol
Gebraucht - Sehr Gut
Broschiert
John Wiley & Sons Inc
20040402
644
N/A
Die Abbildung des Buches dient nur Illustrationszwecken, die tatsächliche Bindung, das Cover und die Auflage können sich davon unterscheiden.
Dies ist ein gebrauchtes Buch. Es wurde schon einmal gelesen und weist von der früheren Nutzung Gebrauchsspuren auf. Wir gehen davon aus, dass es im Großen und Ganzen in einem sehr guten Zustand ist. Sollten Sie jedoch nicht vollständig zufrieden sein, setzen Sie sich bitte mit uns in Verbindung.