Conclusion

Chapter List

Chapter 20: Alternative Payload Strategies
Chapter 21: Writing Exploits that Work in the Wild
Chapter 22: Attacking Database Software
Chapter 23: Kernel Overflows
Chapter 24: Exploiting Kernel Vulnerabilities

Part Overview

This book would not be complete without advanced-level content. We will present some novel payload strategies in Chapter 20, which will allow you to do way more than bind a root shell in your shellcode. We will introduce advanced shellcoding techniques, such as remotely disabling access control on a running program. Getting exploits to work in the wild, outside of your controlled lab environment, often presents a problem for even the most skilled hacker. Chapter 21 teaches you some of the steps to get your exploits to work in the wild. We will then move into hacking specific relational databases, such as Oracle, DB2 and SQL servers, in Chapter 22. Living in a one-application, one-box world means that oftentimes, hacking the database software is more important than the underlying operating system.

Finally, the book finishes with a detailed look into a relatively new phenomenon , kernel hacking, with some kernel vulnerability discovery and exploitation for the OpenBSD and Solaris operating systems in Chapters 23 and 24.



The Shellcoder's Handbook. Discovering and Exploiting Security
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 198
Authors: Neal Krawetz

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net