VIP会员
作者:CSDN
出版社:CSDN《程序员》
ISBN:1111111111117
VIP会员免费
(仅需0.8元/天)
¥ 40000.0
温馨提示: 价值40000元的1000本电子书,VIP会员随意看哦!
电子书推荐
-
黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition).chm 评分:
黑客之道:漏洞发掘的艺术.【英文第二版】.(Hacking.The.Art.of.Exploitation,.2nd.Edition).chm Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson -------------------------------------------------------------------------------- Publisher: No Starch Pub Date: January 15, 2008 Print ISBN-13: 978-1-59-327144-2 Pages: 480 Table of Contents| Index Overview Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
上传时间:2017-07 大小:4.67MB
- 4.66MB
Hacking.The.Art.of.Exploitation,.2nd.Edition
2009-07-14Hacking.The.Art.of.Exploitation,.2nd.Edition
- 4.66MB
hacking the art of exploitation 2nd edition
2019-01-06hacking the art of exploitation 2nd edition book erickson, J 2008 书签完好,非照片
- 4.66MB
Hacking: The Art of Exploitation, 2nd Edition
2010-08-05作者:Jon Erickson 出版:No Starch 2008 ISBN: 978-1-59-327144-2 格式:PDF;4.67MB;480页
- 3.69MB
Hacking - The Art of Exploitation(2nd)高清无水印版
2019-01-23Hacking The Art Of Exploitation 2nd Edition 英文版
- 4.35MB
Hacking: The Art of Exploitation, the 2nd edition
2011-03-29Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves ...
- 1.20MB
The art of exploitation.7z
2019-08-21This book explains the details of various hacking techniques, many of which get very technical. While the fundamental programming concepts that these hacking techniques build from are introduced in ...
- 1.38MB
Hacking - The Art of Exploitation
2008-10-06Hacking is the art of creating problem solving, whether used to find an unconventional solution to a difficult problem or to exploit holes in sloppy programming. Many people call themselves hackers, ...
- 4.4MB
Hacking The Art Of Exploitation 2nd Edition
2017-06-24Hacking The Art Of Exploitation 2nd Edition
- 9.22MB
Hacking - The Art of Exploitation, 2nd Ed
2015-06-15The goal of this book is to share the art of hacking with everyone. Understanding hacking techniques is often difficult, since it requires both breadth and depth of knowledge. Many hacking texts seem ...
- 1.83MB
Hacking: The Art of Exploitation
2009-03-17英文版的PDF格式 This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker,...
- 2.65MB
THE ART OF EXPLOITATION
2019-02-24黑客攻击是解决创造性问题的艺术,无论是为了解决困难问题还是利用漏洞...为了以每个人都可以访问的方式分享黑客的艺术和科学,Hacking:The Explo of Exploitation,2nd Edition从黑客的角度介绍了C编程的基础知识。
- 4.77MB
Hacking The Art of Exploitation 2nd Edition
2010-04-10Hacking The Art of Exploitation 2nd Edition from No Starch Press
- 9.15MB
The art of exploitation
2015-11-11The art of exploitation
- 9.47MB
McGraw.Hill.Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.3rd.Edition.Jan.2011
2011-09-14McGraw.Hill.Gray.Hat.Hacking.The.Ethical.Hackers.Handbook.3rd.Edition.Jan.2011 pdf http://www.amazon.com/Gray-Hacking-Ethical-Hackers-Handbook/dp/0071742557/ref=sr_1_9?ie=UTF8&qid=1315966016&sr=8-9
- 10.13MB
Hacking Windows® XP
2009-09-05E文版 Part I: Customizing Your System . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1: Customizing the Look of the Startup . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: ...
- 14KB
Hacking - The Art Of Exploitation CD torrent
2015-12-10漏洞发掘艺术第二版本的光盘,ubuntu内嵌代码.
- 1.43MB
Hacking_The_Art_of_Exploitation
2009-12-11This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own ...
- 14.44MB
2023苏州:Hacking-Spring.pdf
2024-01-122023苏州:Hacking-Spring.pdf
- 4.46MB
最新版ISO/IEC 27001:2022、ISO 27002:2022中英文合集
2023-06-06ISO 27001:2022英文版 ISO 27001:2022中文版(本人译稿,再也不改了版) ISO 27002:2022英文版 ISO 27002:2022中文版(本人译稿,再也不改了版) 全部为文字版PDF文件,带完整目录标签。
- 108.23MB
Goby红队版-win-x64-2.4.7版本
2023-07-27Goby红队专版:集成1500个poc和exp ,覆盖普通版本所有功能,开箱即用 使用方式: 解压后双击goby.exe运行即可 注意事项: 最新的漏洞不可以在线更新,可自行添加poc和exp 重要的事情说三遍 不要用于非法或未授权测试! 不要用于非法或未授权测试! 不要用于非法或未授权测试! 自行判断可刑性!
- 742KB
Chrome Header Editor 插件
2023-04-27Chrome Header Editor 插件 及 配置文件,旨在取消因流量异常或IP异常导致的谷歌人机验证。
- 1.46MB
ISO SAE 21434-2021 中文版.pdf
2021-11-03ISO SAE 21434中文版
- 145KB
OpenVAS GVM 中文翻译补丁
2023-07-23自己制作的粗糙版 放入/usr/share/gvm/gsad/web/locales目录刷新浏览器即可
- 148.99MB
安全认证cisp教材全套
2021-09-02cisp教材全套,最全的CISP电子版教材,总共20章节分20个PDF文件
- 43.91MB
现代永磁同步电机控制原理及MATLAB仿真__袁雷编著1
2022-08-04内容简介本书着眼于现代永磁同步电机控制原理分析及 MATLAB 仿真应用,系统地介绍了永磁同步电机控制 系统的基本理论、基本方法和应用技术 。全 书分为 3 部
- 179KB
STM32F103C8T6核心板-电路原理图1.PDF
2022-08-04E:\工作\..\STM32F103C8T6.SchDocSTM32F103C8T6核心板原理图源地工作室www.vcc-gnd.com源地工作室http://
- 90KB
全面的安全基线核查清单
2022-08-14全面的安全基线核查清单
- 1.96MB
软件工程导论(第六版)课后习题答案1
2022-08-08第一章一、什么是软件危机?它有哪些典型表现?为什么会出现软件危机?软件危机是指在计算机软件开发、使用与维护过程中遇到的一系列严重问题和难题。它包括两方面:如何开
- 153B
OpenVAS离线资源
2023-07-23离线Deb包 离线NVT SCAP CERT GVMD_DATA数据 中文语言翻译