The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking “unbreakable” software packages such as McAfee’s Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco’s IOS, with content that has never before been explored The companion Web site features downloadable code files

$12.99

10 in stock

Secure Payments

Pay with the worlds payment methods.

Discount Available

Covers payment and purchase gifts.

100% Money-Back Guarantee

Need Help?

(484) 414-5835

Share Our Wines With Your Friends & Family

Description

Editorial Reviews

From the Inside Flap

The black hats have kept up with security enhancements. Have you?

Three years is a lifetime in the technological arena. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. It’s still possible for attackers to run code of their choice on your system.

The book is about code and data and what happens when they become confused. The basic building blocks of security bugs areassembler, source code, the stack, and the heap. You’ll understand the systems you’re running and how to protect them.

  • Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco’s IOS
  • You can learn how to write your own tools to protect your systems.

  • When auditing a network, use a working exploit to verify your assessment.

  • To rate the significance of bugs in software, use proof-of-concept exploits.

  • Penetration tests can be performed on purchased security products based on the information in this book.

  • Understand how exploits work and how bugs are found.

–This text refers to an alternate kindle_edition edition.

From the Back Cover

The black hats have kept up with security enhancements. Have you?

Three years is a lifetime in the technological arena. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. It’s still possible for attackers to run code of their choice on your system.

The book is about code and data and what happens when they become confused. The basic building blocks of security bugs areassembler, source code, the stack, and the heap. You’ll understand the systems you’re running and how to protect them.

  • Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco’s IOS
  • You can learn how to write your own tools to protect your systems.

  • When auditing a network, use a working exploit to verify your assessment.

  • To rate the significance of bugs in software, use proof-of-concept exploits.

  • Penetration tests can be performed on purchased security products based on the information in this book.

  • Understand how exploits work and how bugs are found.

–This text refers to an alternate kindle_edition edition.

About the Author

Chris Anley is a founder and director of NGSSoftware, a security software, consultancy, and research company based in London, England. He is actively involved in vulnerability research and has discovered security flaws in a wide variety of platforms including Microsoft Windows, Oracle, SQL Server, IBM DB2, Sybase ASE, MySQL, and PGP.

Heasman was John. He is the Director of Research. He has published many security advisories in enterprise level software. He has an interest in rootkits and has written papers on the subject. He is a co-author. The Handbook of the Database Hacker. The book was published in 2005.

Felix, what is your name? There is a person named Linder. SABRE Labs is a Berlin-based professional consulting company specializing in security analysis, system design creation, and verification work. Felix has 18 years of programming and 10 years of computer security consulting for enterprise, carrier, and software vendor clients. Even in atypical scenarios and on arcane platforms, this experience allows him to quickly dive into complex systems and evaluate them from a security and robustness point of view. In his spare time, FX works with his friends from the Phenoelit hacking group on a variety of topics, which have included HP printers, andRIM BlackBerry.

The man is Gerardo Richarte. For more than 15 years, he has been doing reverse engineering and exploiting development. He helped build the technical arm of Core Security Technologies in the past 10 years. His current duties include developing exploits for Core IMPACT, researching new exploitation techniques and other low-level subjects, helping other exploit writers when things get hairy, and teaching internal and external classes on assembly and exploit writing. As a thank you to the community, he has published some technical papers and open source projects, as well as releasing part of his training material. He enjoys reverse engineering any piece of code that falls in his reach just for the fun of doing it.

–This text refers to an alternate kindle_edition edition.

Read more

Additional information

Best Sellers Rank

#602,824 in Kindle Store (See Top 100 in Kindle Store) #152 in Software Programming Compilers #651 in Security & Encryption #2,533 in Computer Security & Encryption (Books)

Customer Reviews

/* * Fix for UDP-1061. Average customer reviews has a small extra line on hover * https

Reviews

There are no reviews yet.

Be the first to review “The Shellcoder’s Handbook: Discovering and Exploiting Security Holes”

Your email address will not be published. Required fields are marked *