Flylib.com
Shellcoders Programming Uncovered (Uncovered series)
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
Shellcoders Programming Uncovered
Back Cover
About
Introduction
Part I: Introduction to Shellcoding
Chapter 1: Required Tools
Programming Languages
Analysis, Debugging, and Reverse-Engineering Tools
Must-Read Books and Other References
Chapter 2: Assembly Language -- Quick Start
Assembly Language Philosophy
Explaining Assembly Concepts on C Examples
Assembly Inserts as a Workbench
Chapter 3: Hacking Using GPRS Uncovered
Hacking Using GPRS
Part II: Overflow Errors
Chapter 4: Buffers Subject to Overflow (Lane of Monsters)
Classifying Overflow Errors (Terrible Boredom)
Historical Inevitability of Overflow Errors
Myths and Legends about Overflow Errors
Goals and Possibilities of Attacks
Chapter 5: Exploiting SEH
Brief Information about Structured Exceptions
Capturing Control
Suppressing Abnormal Application Termination
Chapter 6: Specifiers Under Control
Functions Supporting Formatted Output
Cfingerd Patch
Sources of Potential Threat
Chapter 7: Practical Overflow Example
Source of the Threat
Technical Details
Exploit
Reanimating the Exploit
Developing Shellcode
Victory or Defeat
Where Do You Go from Here?
Chapter 8: Searching for Overflowing Buffers
Buried Under a Pile of Printouts
Adventure of Binary Code
Practical Example of an Overflow Error
Chapter 9: Methods of Protecting Buffers Against Overflow
Antihacking Techniques
Problems with Memory Allocation
Part III: Secrets of Designing Shellcode
Chapter 10: Shellcoding Problems
Size Is Important
Searching for Yourself
Technique of Calling System Functions
Interesting References on Shellcoding
Chapter 11: The Technique of Writing Portable Shellcode
Requirements for Portable Shellcode
Ways of Achieving Portability
Drawbacks of Hard-Encoding
Direct Search in Memory
Over Open Sights: PEB
Unwinding the SEH Stack
Native API
Different Methods of Ensuring Portability
Chapter 12: Self-Modification Basics
Principles of Building Self-Modifying Code
Chapter 13: Playing Hide-and-Seek Under Linux
Loadable Kernel Modules
Excluding Processes from the Task List
Trapping System Calls
Trapping Requests to the File System
When Modules Are Unavailable
Other Methods of Disguise
Chapter 14: Capturing Ring 0 Under Linux
Honest Ways of Hacking
Kernel Bluetooth Local Root Exploit for Linux
ELFs Fall into the Dump
Problems with Multithreading
Getting Root on Multiprocessor Machines
Interesting Resources
Chapter 15: Compiling and Decompiling Shellcode
Decompiling Shellcode
Part IV: Network Worms and Local Viruses
Chapter 16: Life Cycle of a Worm
Initialization, or Some Words before the Real Introduction
Introduction to Worms
Chapter 17: Local Viruses in the UNIX World
Conditions Required for Support of Virus Activity
Chapter 18: Viruses in Scripts
Chapter 19: ELF Files
ELF File Structure
General Structure and Strategy of Virus Behavior
Chapter 20: Method of Capturing Control
Insertion of the Virus Code Near the Entry Point
Modification of the Import Table
Chapter 21: Main Symptoms of Virus Infection
How Helpful are Antivirus Programs?
Internet Resources Related to Virus Infection
Chapter 22: Simplest Windows NT Virus
The Algorithm of Virus Operation
Source Code of a Lab Virus
Compiling and Testing the Virus
Enumerating Streams
Useful Resources
Part V: Firewalls, Honeypots, and Other Protection Systems
Chapter 23: Bypassing Firewalls
Threats the Firewalls Can and Cannot Protect Against
Detecting and Identifying a Firewall
Scanning and Tracing through the Firewall
Penetrating the Firewall
Links Related to Firewalls
Chapter 24: Escaping through the Firewall
Firewall Dos and Don ts
Establishing a Connection to the Remote Host
Chapter 25: Organizing a Remote Shell Under UNIX and Windows NT
Blind Shell
Fully Functional Shell
Chapter 26: Hackerz Love Honey
What Is in the Pot?
Preparing for an Attack
Casting Light on Honeypots
Deceitful Manoeuvres
Attack at the Honeypot
Drowned in the Honey
Chapter 27: Sniffing a LAN
Passive Sniffing
Active Sniffing or ARP Spoofing
Cloning Network Adapters
Cloning Network Adapters
Sniffing Dial-up Traffic
When Sniffers Are Useless
Stealth Sniffing
Resources Related to Sniffing
Chapter 28: Databases Under Attack
Weak Password-Encryption Algorithms
Password Sniffing
Hacking a Script
Imposing a Query or SQL Injection
How To Detect the Presence of an SQL Server
Counteracting Intrusion
Part VI: Exotic Objects for Insertion
Chapter 29: Attacking Bluetooth
What Is Bluetooth?
Sharpshooting Antenna
Authorization and Authentication
Methods of Attack
Overview of Bluetooth Hacking Tools
Chapter 30: Economizing on GPRS
Working through a Proxy Server
Google Web Accelerator
Tunneling through Telnet
Tunneling through ICMP
Chapter 31: Legends and Myths about Flashing BIOS
Benefits of BIOS Updates
When To Upgrade BIOS
Hacking BIOS
Chapter 32: Viruses Infecting BIOS
How To Proceed
Inside BIOS
Baptizing by Fire, or Creating an ISA ROM Module
Modifying the Boot Block
System Overclocking
Useful Links Related to BIOS
CD Description
List of Figures
List of Tables
List of Listings
CD Content
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Reviewing Critical Systems and Information
Preparing the Final Report
IT Security Architecture and Framework
Level II Assessment Forms
Appendix E. SIRT Team Report Format Template
Competency-Based Human Resource Management
Why a Focus on Jobs Is Not Enough
An Overview of Competency-Based HR Management Practices
Competency-Based HR Planning
Competency-Based Employee Rewards
Appendix B Further Suggestions on Employee Development
An Introduction to Design Patterns in C++ with Qt 4
C++ Introduction
Iterators
Overloading Functions
Parameter Passing by Reference
Regions and QDockWidgets
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
When Companies Start Using Lean Six Sigma
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Six Things Managers Must Do: How to Support Lean Six Sigma
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Working with Groups
Changing the Layout of Connected Shapes
Creating Project Schedules
Importing Data to Create Organization Charts
Storing and Displaying Employee Information in Organization Charts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies