Flylib.com
Shellcoders Programming Uncovered (Uncovered series)
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
Shellcoders Programming Uncovered
Back Cover
About
Introduction
Part I: Introduction to Shellcoding
Chapter 1: Required Tools
Programming Languages
Analysis, Debugging, and Reverse-Engineering Tools
Must-Read Books and Other References
Chapter 2: Assembly Language -- Quick Start
Assembly Language Philosophy
Explaining Assembly Concepts on C Examples
Assembly Inserts as a Workbench
Chapter 3: Hacking Using GPRS Uncovered
Hacking Using GPRS
Part II: Overflow Errors
Chapter 4: Buffers Subject to Overflow (Lane of Monsters)
Classifying Overflow Errors (Terrible Boredom)
Historical Inevitability of Overflow Errors
Myths and Legends about Overflow Errors
Goals and Possibilities of Attacks
Chapter 5: Exploiting SEH
Brief Information about Structured Exceptions
Capturing Control
Suppressing Abnormal Application Termination
Chapter 6: Specifiers Under Control
Functions Supporting Formatted Output
Cfingerd Patch
Sources of Potential Threat
Chapter 7: Practical Overflow Example
Source of the Threat
Technical Details
Exploit
Reanimating the Exploit
Developing Shellcode
Victory or Defeat
Where Do You Go from Here?
Chapter 8: Searching for Overflowing Buffers
Buried Under a Pile of Printouts
Adventure of Binary Code
Practical Example of an Overflow Error
Chapter 9: Methods of Protecting Buffers Against Overflow
Antihacking Techniques
Problems with Memory Allocation
Part III: Secrets of Designing Shellcode
Chapter 10: Shellcoding Problems
Size Is Important
Searching for Yourself
Technique of Calling System Functions
Interesting References on Shellcoding
Chapter 11: The Technique of Writing Portable Shellcode
Requirements for Portable Shellcode
Ways of Achieving Portability
Drawbacks of Hard-Encoding
Direct Search in Memory
Over Open Sights: PEB
Unwinding the SEH Stack
Native API
Different Methods of Ensuring Portability
Chapter 12: Self-Modification Basics
Principles of Building Self-Modifying Code
Chapter 13: Playing Hide-and-Seek Under Linux
Loadable Kernel Modules
Excluding Processes from the Task List
Trapping System Calls
Trapping Requests to the File System
When Modules Are Unavailable
Other Methods of Disguise
Chapter 14: Capturing Ring 0 Under Linux
Honest Ways of Hacking
Kernel Bluetooth Local Root Exploit for Linux
ELFs Fall into the Dump
Problems with Multithreading
Getting Root on Multiprocessor Machines
Interesting Resources
Chapter 15: Compiling and Decompiling Shellcode
Decompiling Shellcode
Part IV: Network Worms and Local Viruses
Chapter 16: Life Cycle of a Worm
Initialization, or Some Words before the Real Introduction
Introduction to Worms
Chapter 17: Local Viruses in the UNIX World
Conditions Required for Support of Virus Activity
Chapter 18: Viruses in Scripts
Chapter 19: ELF Files
ELF File Structure
General Structure and Strategy of Virus Behavior
Chapter 20: Method of Capturing Control
Insertion of the Virus Code Near the Entry Point
Modification of the Import Table
Chapter 21: Main Symptoms of Virus Infection
How Helpful are Antivirus Programs?
Internet Resources Related to Virus Infection
Chapter 22: Simplest Windows NT Virus
The Algorithm of Virus Operation
Source Code of a Lab Virus
Compiling and Testing the Virus
Enumerating Streams
Useful Resources
Part V: Firewalls, Honeypots, and Other Protection Systems
Chapter 23: Bypassing Firewalls
Threats the Firewalls Can and Cannot Protect Against
Detecting and Identifying a Firewall
Scanning and Tracing through the Firewall
Penetrating the Firewall
Links Related to Firewalls
Chapter 24: Escaping through the Firewall
Firewall Dos and Don ts
Establishing a Connection to the Remote Host
Chapter 25: Organizing a Remote Shell Under UNIX and Windows NT
Blind Shell
Fully Functional Shell
Chapter 26: Hackerz Love Honey
What Is in the Pot?
Preparing for an Attack
Casting Light on Honeypots
Deceitful Manoeuvres
Attack at the Honeypot
Drowned in the Honey
Chapter 27: Sniffing a LAN
Passive Sniffing
Active Sniffing or ARP Spoofing
Cloning Network Adapters
Cloning Network Adapters
Sniffing Dial-up Traffic
When Sniffers Are Useless
Stealth Sniffing
Resources Related to Sniffing
Chapter 28: Databases Under Attack
Weak Password-Encryption Algorithms
Password Sniffing
Hacking a Script
Imposing a Query or SQL Injection
How To Detect the Presence of an SQL Server
Counteracting Intrusion
Part VI: Exotic Objects for Insertion
Chapter 29: Attacking Bluetooth
What Is Bluetooth?
Sharpshooting Antenna
Authorization and Authentication
Methods of Attack
Overview of Bluetooth Hacking Tools
Chapter 30: Economizing on GPRS
Working through a Proxy Server
Google Web Accelerator
Tunneling through Telnet
Tunneling through ICMP
Chapter 31: Legends and Myths about Flashing BIOS
Benefits of BIOS Updates
When To Upgrade BIOS
Hacking BIOS
Chapter 32: Viruses Infecting BIOS
How To Proceed
Inside BIOS
Baptizing by Fire, or Creating an ISA ROM Module
Modifying the Boot Block
System Overclocking
Useful Links Related to BIOS
CD Description
List of Figures
List of Tables
List of Listings
CD Content
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Understanding the Action Pane
Working with Documents
JavaScript Support in Domino 6
Real-World Java Examples
Introducing Workflow
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Logistics in Tesco: Past, Present and Future
Temperature-Controlled Supply Chains
The Development of E-tail Logistics
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Twisted Network Programming Essentials
Adding Twisted Utilities to Your Path
Starting the Twisted Event Loop
Sending Mail Using SMTP
Downloading Messages from an IMAP Mailbox
Accepting Mail with SMTP
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #1 Lockheed Martin Creating a New Legacy
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Success Story #4 Stanford Hospital and Clinics At the forefront of the quality revolution
Phase 1 Readiness Assessment
Service Process Challenges
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Properties, Methods, and Events
Working with the Window Object
Conclusion
Conclusion
Code Access Security Versus Role-Based Security
Comparing, Designing, and Deploying VPNs
Review Questions
MTU and Fragmentation Considerations in an IPsec VPN
Review Questions
Comparing SSL VPNs to Other Types of Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies