Table of Contents |
| Shellcoder's Programming Uncovered |
| Introduction |
Part I - Introduction to Shellcoding |
| Chapter 1 | - | Required Tools |
| Chapter 2 | - | Assembly Language ” Quick Start |
| Chapter 3 | - | Hacking Using GPRS Uncovered |
Part II - Overflow Errors |
| Chapter 4 | - | Buffers Subject to Overflow (Lane of Monsters) |
| Chapter 5 | - | Exploiting SEH |
| Chapter 6 | - | Specifiers Under Control |
| Chapter 7 | - | Practical Overflow Example |
| Chapter 8 | - | Searching for Overflowing Buffers |
| Chapter 9 | - | Methods of Protecting Buffers Against Overflow |
Part III - Secrets of Designing Shellcode |
| Chapter 10 | - | Shellcoding Problems |
| Chapter 11 | - | The Technique of Writing Portable Shellcode |
| Chapter 12 | - | Self-Modification Basics |
| Chapter 13 | - | Playing Hide-and-Seek Under Linux |
| Chapter 14 | - | Capturing Ring 0 Under Linux |
| Chapter 15 | - | Compiling and Decompiling Shellcode |
Part IV - Network Worms and Local Viruses |
| Chapter 16 | - | Life Cycle of a Worm |
| Chapter 17 | - | Local Viruses in the UNIX World |
| Chapter 18 | - | Viruses in Scripts |
| Chapter 19 | - | ELF Files |
| Chapter 20 | - | Method of Capturing Control |
| Chapter 21 | - | Main Symptoms of Virus Infection |
| Chapter 22 | - | Simplest Windows NT Virus |
Part V - Firewalls, Honeypots, and Other Protection Systems |
| Chapter 23 | - | Bypassing Firewalls |
| Chapter 24 | - | Escaping through the Firewall |
| Chapter 25 | - | Organizing a Remote Shell Under UNIX and Windows NT |
| Chapter 26 | - | Hackerz Love Honey |
| Chapter 27 | - | Sniffing a LAN |
| Chapter 28 | - | Databases Under Attack |
Part VI - Exotic Objects for Insertion |
| Chapter 29 | - | Attacking Bluetooth |
| Chapter 30 | - | Economizing on GPRS |
| Chapter 31 | - | Legends and Myths about Flashing BIOS |
| Chapter 32 | - | Viruses Infecting BIOS |
| CD Description |
| List of Figures |
| List of Tables |
| List of Listings |
| CD Content |