M

N

$9 “14 registers (Alpha CPU), 303
Nagel algorithm, 359
Named Pipe Hijacking issue, Andreas Junestam, 410
NetCat, 338
Netwide Assembler (NASM), 335
network analysis tools, 374 “375
network layer attacks on database server software, 510 “520
network- related shellcode failures, 501
Newsham, Tim
Format String Attacks (article) , 342
syscall proxies, 487
No Operation (NOP) method, 27 “29
non-executable stack
defined, 29 “30
exploits, 191 “193
Solaris/SPARC, 216, 266 “268
Tru64, 320 “322
Windows, 191
non- fragmented heap, 92
non-null termination of strings, 393 “394
Non-Stack Based Exploitation of Buffer Overrun Vulnerabilities on Windows NT/2000/XP (article), David Litchfield, 341
non-traditional BP-based stack frames , 456
NOP instruction (Solaris), 222
NOP (No Operation) method, 27 “29
normalizing the heap, 99
NT/ZwQueryInformationProcess kernel function, 180
null characters , 42 “44
null termination in strings, 394 “395


The Shellcoder's Handbook. Discovering and Exploiting Security
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 198
Authors: Neal Krawetz

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net