Following are select files from this book's Companion CD-ROM. These files are for your personal use, are governed by the Books24x7 Membership Agreement, and are copyright protected by the publisher, author, and/or other third parties. Unauthorized use, reproduction, or distribution is strictly prohibited .
Click on the link(s) below to download the files to your computer:
File | Description | Size |
---|---|---|
All CD Content | Shellcoder s Programming Uncovered | 6,767,551 |
Chapter 1: | Required Tools | 346,189 |
Chapter 3: | Hacking Using GPRS Uncovered | 455,545 |
Chapter 4: | Buffers Subject to Overflow (Lane of Monsters) | 38,202 |
Chapter 5: | Exploiting SEH | 5,697 |
Chapter 6: | Specifiers Under Control | 72,924 |
Chapter 7: | Practical Overflow Example | 79,706 |
Chapter 8: | Searching for Overflowing Buffers | 159,968 |
Chapter 9: | Methods of Protecting Buffers Against Overflow | 24,120 |
Chapter 10: | Shellcoding Problems | 34,831 |
Chapter 12: | Self-Modification Basics | 66,514 |
Chapter 13: | Playing Hide-and-Seek Under Linux | 769,139 |
Chapter 14: | Capturing Ring 0 Under Linux | 1,064 |
Chapter 15: | Compiling and Decompiling Shellcode | 303,696 |
Chapter 16: | Life Cycle of a Worm | 110,694 |
Chapter 17: | Local Viruses in the UNIX World | 6,850 |
Chapter 19: | ELF Files | 183,802 |
Chapter 21: | Main Symptoms of Virus Infection | 91,288 |
Chapter 22: | Simplest Windows NT Virus | 29,259 |
Chapter 23: | Bypassing Firewalls | 62,560 |
Chapter 24: | Escaping through the Firewall | 268,057 |
Chapter 26: | Hackerz Love Honey | 7,847 |
Chapter 27: | Sniffing a LAN | 299,883 |
Chapter 28: | Databases Under Attack | 87,822 |
Chapter 29: | Attacking Bluetooth | 1,263,635 |
Chapter 30: | Economizing on GPRS | 1,235,428 |
Chapter 31: | Legends and Myths about Flashing BIOS | 178,099 |
Chapter 32: | Viruses Infecting BIOS | 111,117 |
Kit | 78,108 | |
Src | 210,634 | |
Other Content - 1 | 1,720 |