Table of Contents | |||
The Shellcoder's Handbook ”Discovering and Exploiting Security Holes | |||
Part 1 - Introduction to Exploitation: Linux on x86 | |||
Chapter 1 | - | Before You Begin | |
Chapter 2 | - | Stack Overflows | |
Chapter 3 | - | Shellcode | |
Chapter 4 | - | Introduction to Format String Bugs | |
Chapter 5 | - | Introduction to Heap Overflows | |
Part 2 - Exploiting More Platforms: Windows, Solaris, and Tru64 | |||
Chapter 6 | - | The Wild World of Windows | |
Chapter 7 | - | Windows Shellcode | |
Chapter 8 | - | Windows Overflows | |
Chapter 9 | - | Overcoming Filters | |
Chapter 10 | - | Introduction to Solaris Exploitation | |
Chapter 11 | - | Advanced Solaris Exploitation | |
Chapter 12 | - | HP Tru64 Unix Exploitation | |
Part 3 - Vulnerability Discovery | |||
Chapter 13 | - | Establishing a Working Environment | |
Chapter 14 | - | Fault Injection | |
Chapter 15 | - | The Art of Fuzzing | |
Chapter 16 | - | Source Code Auditing: Finding Vulnerabilities in C-Based Languages | |
Chapter 17 | - | Instrumented Investigation: A Manual Approach | |
Chapter 18 | - | Tracing for Vulnerabilities | |
Chapter 19 | - | Binary Auditing: Hacking Closed Source Software | |
Part 4 - Advanced Materials | |||
Chapter 20 | - | Alternative Payload Strategies | |
Chapter 21 | - | Writing Exploits that Work in the Wild | |
Chapter 22 | - | Attacking Database Software | |
Chapter 23 | - | Kernel Overflows | |
Chapter 24 | - | Exploiting Kernel Vulnerabilities | |
Index | |||
List of Figures | |||
List of Tables | |||
List of Sidebars |