没有合适的资源?快使用搜索试试~ 我知道了~
The Shellcoder's Handbook 2nd Edition
需积分: 15 10 下载量 104 浏览量
2018-06-30
09:29:30
上传
评论 1
收藏 8.78MB PDF 举报
温馨提示
试读
744页
The Shellcoder's Handbook 2nd Edition About the Authors vii Acknowledgments xi Introduction to the Second Edition xxiii Part I Introduction to Exploitation: Linux on x86 Chapter 1 Before You Begin 3 Basic Concepts 3 Memory Management 4 Assembly 6 Recognizing C and C++ Code Constructs in Assembly 7 Conclusion 10 Chapter 2 Stack Overflows 11 Buffers 12 The Stack 13 Functions and the Stack 15 Overflowing Buffers on the Stack 18 Controlling EIP 22 An Interesting Diversion 23 Using an Exploit to Get Root Privileges 25 The Address Problem 27 The NOP Method 33 Defeating a Non-Executable Stack 35 Return to libc 35 Conclusion 39
资源推荐
资源详情
资源评论
Chris Anley
John Heasman
Felix “FX” Linder
Gerardo Richarte
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
(1st Edition) was written by Jack Koziol, David Litchfield, Dave Aitel,
Chris Anley, Sinan Eren, Neel Mehta, and Riley Hassell.
The Shellcoder’s
Handbook
Discovering and Exploiting Security Holes
Second Edition
Wiley Publishing, Inc.
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page iii
The Shellcoder’s Handbook
Second Edition
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page i
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page ii
Chris Anley
John Heasman
Felix “FX” Linder
Gerardo Richarte
The Shellcoder’s Handbook: Discovering and Exploiting Security Holes
(1st Edition) was written by Jack Koziol, David Litchfield, Dave Aitel,
Chris Anley, Sinan Eren, Neel Mehta, and Riley Hassell.
The Shellcoder’s
Handbook
Discovering and Exploiting Security Holes
Second Edition
Wiley Publishing, Inc.
80238ffirs.qxd:WileyRed 7/11/07 7:22 AM Page iii
剩余743页未读,继续阅读
资源评论
LDWJ2016
- 粉丝: 47
- 资源: 198
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功