The black hats have kept up with security enhancements. Have you?
Three years is a lifetime in the technological arena. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. It’s still possible for attackers to run code of their choice on your system.
The book is about code and data and what happens when they become confused. The basic building blocks of security bugs areassembler, source code, the stack, and the heap. You’ll understand the systems you’re running and how to protect them.
- Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco’s IOS
-
You can learn how to write your own tools to protect your systems.
-
When auditing a network, use a working exploit to verify your assessment.
-
To rate the significance of bugs in software, use proof-of-concept exploits.
-
Penetration tests can be performed on purchased security products based on the information in this book.
-
Understand how exploits work and how bugs are found.
–This text refers to an alternate kindle_edition edition.
The black hats have kept up with security enhancements. Have you?
Three years is a lifetime in the technological arena. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. It’s still possible for attackers to run code of their choice on your system.
The book is about code and data and what happens when they become confused. The basic building blocks of security bugs areassembler, source code, the stack, and the heap. You’ll understand the systems you’re running and how to protect them.
- Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco’s IOS
-
You can learn how to write your own tools to protect your systems.
-
When auditing a network, use a working exploit to verify your assessment.
-
To rate the significance of bugs in software, use proof-of-concept exploits.
-
Penetration tests can be performed on purchased security products based on the information in this book.
-
Understand how exploits work and how bugs are found.
–This text refers to an alternate kindle_edition edition.
About the Author
Chris Anley is a founder and director of NGSSoftware, a security software, consultancy, and research company based in London, England. He is actively involved in vulnerability research and has discovered security flaws in a wide variety of platforms including Microsoft Windows, Oracle, SQL Server, IBM DB2, Sybase ASE, MySQL, and PGP.
Heasman was John. He is the Director of Research. He has published many security advisories in enterprise level software. He has an interest in rootkits and has written papers on the subject. He is a co-author. The Handbook of the Database Hacker. The book was published in 2005.
Felix, what is your name? There is a person named Linder. SABRE Labs is a Berlin-based professional consulting company specializing in security analysis, system design creation, and verification work. Felix has 18 years of programming and 10 years of computer security consulting for enterprise, carrier, and software vendor clients. Even in atypical scenarios and on arcane platforms, this experience allows him to quickly dive into complex systems and evaluate them from a security and robustness point of view. In his spare time, FX works with his friends from the Phenoelit hacking group on a variety of topics, which have included HP printers, andRIM BlackBerry.
The man is Gerardo Richarte. For more than 15 years, he has been doing reverse engineering and exploiting development. He helped build the technical arm of Core Security Technologies in the past 10 years. His current duties include developing exploits for Core IMPACT, researching new exploitation techniques and other low-level subjects, helping other exploit writers when things get hairy, and teaching internal and external classes on assembly and exploit writing. As a thank you to the community, he has published some technical papers and open source projects, as well as releasing part of his training material. He enjoys reverse engineering any piece of code that falls in his reach just for the fun of doing it.
–This text refers to an alternate kindle_edition edition.
Reviews
There are no reviews yet.