N
$9 “14 registers (Alpha CPU), 303
Named Pipe Hijacking issue, Andreas Junestam, 410
Netwide Assembler (NASM), 335
network analysis tools, 374 “375
network layer attacks on database server software, 510 “520
network- related shellcode failures, 501
Newsham, Tim
Format String Attacks (article) , 342
syscall proxies, 487
No Operation (NOP) method, 27 “29
non-executable stack
defined, 29 “30
exploits, 191 “193
Solaris/SPARC, 216, 266 “268
Tru64, 320 “322
Windows, 191
non-null termination of strings, 393 “394
Non-Stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT/2000/XP (article), David Litchfield, 341
non-traditional BP-based stack frames , 456
NOP instruction (Solaris), 222
NOP (No Operation) method, 27 “29
NT/ZwQueryInformationProcess kernel function, 180
null termination in strings, 394 “395