VIP会员
作者:CSDN
出版社:CSDN《程序员》
ISBN:1111111111117
VIP会员免费
(仅需0.8元/天)
¥ 40000.0
温馨提示: 价值40000元的1000本电子书,VIP会员随意看哦!
电子书推荐
-
黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition).chm 评分:
黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition).chm Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson -------------------------------------------------------------------------------- Publisher: No Starch Pub Date: January 15, 2008 Print ISBN-13: 978-1-59-327144-2 Pages: 480 Table of Contents| Index Overview Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
上传时间:2009-07 大小:4.67MB
- 4.4MB
Hacking The Art Of Exploitation 2nd Edition
2017-06-24Hacking The Art Of Exploitation 2nd Edition
- 3.69MB
Hacking - The Art of Exploitation(2nd)高清无水印版
2019-01-23Hacking The Art Of Exploitation 2nd Edition 英文版
- 4.66MB
Hacking.The.Art.of.Exploitation,.2nd.Edition
2009-07-14Hacking.The.Art.of.Exploitation,.2nd.Edition
- 4.66MB
hacking the art of exploitation 2nd edition
2019-01-06hacking the art of exploitation 2nd edition book erickson, J 2008 书签完好,非照片
- 4.66MB
Hacking: The Art of Exploitation, 2nd Edition
2010-08-05作者:Jon Erickson 出版:No Starch 2008 ISBN: 978-1-59-327144-2 格式:PDF;4.67MB;480页
- 4.35MB
Hacking: The Art of Exploitation, the 2nd edition
2011-03-29Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ...
- 1.20MB
The art of exploitation.7z
2019-08-21This book explains the details of various hacking techniques, many of which get very technical. While the fundamental programming concepts that these hacking techniques build from are introduced in ...
- 1.38MB
Hacking - The Art of Exploitation
2008-10-06Hacking is the art of creating problem solving, whether used to find an unconventional solution to a difficult problem or to exploit holes in sloppy programming. Many people call themselves hackers, ...
- 9.22MB
Hacking - The Art of Exploitation, 2nd Ed
2015-06-15The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem ...
- 1.83MB
Hacking: The Art of Exploitation
2009-03-17英文版的PDF格式 This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker,...
- 2.65MB
THE ART OF EXPLOITATION
2019-02-24黑客攻击是解决创造性问题的艺术,无论是为了解决困难问题还是利用漏洞...为了以每个人都可以访问的方式分享黑客的艺术和科学,Hacking:The Explo of Exploitation,2nd Edition从黑客的角度介绍了C编程的基础知识。
- 4.77MB
Hacking The Art of Exploitation 2nd Edition
2010-04-10Hacking The Art of Exploitation 2nd Edition from No Starch Press
- 9.15MB
The art of exploitation
2015-11-11The art of exploitation
- 9.47MB
McGraw.Hill.Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.3rd.Edition.Jan.2011
2011-09-14McGraw.Hill.Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.3rd.Edition.Jan.2011 pdf http://www.amazon.com/Gray-Hacking-Ethical-Hackers-Handbook/dp/0071742557/ref=sr_1_9?ie=UTF8&qid=1315966016&sr=8-9
- 10.13MB
Hacking Windows® XP
2009-09-05E文版 Part I: Customizing Your System . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1: Customizing the Look of the Startup . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: ...
- 14KB
Hacking - The Art Of Exploitation CD torrent
2015-12-10漏洞发掘艺术第二版本的光盘,ubuntu内嵌代码.
- 1.43MB
Hacking_The_Art_of_Exploitation
2009-12-11This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own ...
- 14.44MB
2023苏州:Hacking-Spring.pdf
2024-01-122023苏州:Hacking-Spring.pdf
- 20.80MB
冰河的渗透实战笔记-冰河.pdf
2021-05-18冰河整理的全网首个开源的以实战案例为背景的渗透实战笔记,全书共442页,共计37万字(不计空格)。整本书的内容涵盖:Kali基础、渗透工具、木马制作、钓鱼链接生成、爆破密码、内存溢出攻击、web渗透、数据提权、社会工程学。
- 12.5MB
大灰狼远控2021最新版,解压密码222
2021-12-10大灰狼远控2021最新版,解压密码222
- 360KB
J-LINK V10 V11固件.rar
2021-10-26用于重新更新jlink v10和v11的固件文件,亲测可用
- 1.33MB
ISO21434.pdf
2021-09-16ISO21434 2021-8 月最新版国际汽车信息安全标准,流程标准,ISO26262
- 159.35MB
Web安全漏洞扫描工具-AWVS14
2021-07-05AWVS14,Acunetix Web Vulnerability Scanner(简称AWVS)是一款知名的网络漏洞扫描工具,它通过网络爬虫测试你的网站安全,检测流行安全漏洞。WVS可以检查SQL注入漏洞,也可以检查跨站脚本攻击漏洞,可以扫描任何可以通过web浏览访问和遵循HTTP/HTTPS规则的web站点和web应用程序。
- 22.90MB
CTF 竞赛入门指南(ctf-all-in-one).pdf
2019-09-07一、基础篇;二、工具篇;三、分类专题篇;四、技巧篇;五、高级篇;六、题解篇;七、实战篇... 2000多页的电子书,讲解细致,值得搜藏。
- 9.32MB
Web中间件常见漏洞总结.pdf
2021-06-14Web中间件常见漏洞总结
- 3.43MB
stm32f103 adc采样+dma传输+fft处理 频率计_fft处理_stm32_ADCFFT_频率计_ADC采样_
2021-10-01数字示波器,实现ADC采样,波形显示,fft处理数据,频率计作用
- 9.14MB
jts-1.14.zip
2021-03-29jts-1.14.zip
- 28.1MB
CobaltStrike4.4.zip
2021-09-15CobaltStrike4.4
- 209B
cisp-pte渗透测试资源下载 (考试环境+题库)
2020-11-26cisp-pte渗透测试资源下载 ,包括 考试环境、题目。
- 159.92MB
RK3568硬件设计资料.zip_C#
2022-07-15RK3568硬件设计资料,主要为原理图和PCB文件。