| |
| Table of Contents | |||
| The Shellcoder's Handbook ”Discovering and Exploiting Security Holes | |||
| Part 1 - Introduction to Exploitation: Linux on x86 | |||
| Chapter 1 | - | Before You Begin | |
| Chapter 2 | - | Stack Overflows | |
| Chapter 3 | - | Shellcode | |
| Chapter 4 | - | Introduction to Format String Bugs | |
| Chapter 5 | - | Introduction to Heap Overflows | |
| Part 2 - Exploiting More Platforms: Windows, Solaris, and Tru64 | |||
| | Chapter 6 | - | The Wild World of Windows |
| | Chapter 7 | - | Windows Shellcode |
| Chapter 8 | - | Windows Overflows | |
| | Chapter 9 | - | Overcoming Filters |
| | Chapter 10 | - | Introduction to Solaris Exploitation |
| | Chapter 11 | - | Advanced Solaris Exploitation |
| | Chapter 12 | - | HP Tru64 Unix Exploitation |
| Part 3 - Vulnerability Discovery | |||
| | Chapter 13 | - | Establishing a Working Environment |
| Chapter 14 | - | Fault Injection | |
| | Chapter 15 | - | The Art of Fuzzing |
| | Chapter 16 | - | Source Code Auditing: Finding Vulnerabilities in C-Based Languages |
| | Chapter 17 | - | Instrumented Investigation: A Manual Approach |
| | Chapter 18 | - | Tracing for Vulnerabilities |
| | Chapter 19 | - | Binary Auditing: Hacking Closed Source Software |
| Part 4 - Advanced Materials | |||
| | Chapter 20 | - | Alternative Payload Strategies |
| | Chapter 21 | - | Writing Exploits that Work in the Wild |
| | Chapter 22 | - | Attacking Database Software |
| | Chapter 23 | - | Kernel Overflows |
| | Chapter 24 | - | Exploiting Kernel Vulnerabilities |
| | Index | ||
| | List of Figures | ||
| | List of Tables | ||
| | List of Sidebars | ||