List of Figures

Chapter 4: Introduction to Format String Bugs

Table 4.1: Writing to Addresses

Chapter 10: Introduction to Solaris Exploitation

Table 10.1: Global Registers and Purposes
Table 10.2: Register Names and Purposes
Table 10.3: Effects of a save Instruction
Table 10.4: Effects of a restore Instruction
Table 10.5: Useful System Calls and Associated Numbers
Table 10.6: NOP Alternatives
Table 10.7: Memory Management on Solaris
Table 10.8: Saved Register Windows Layout on the Stack
Table 10.9: Required TREE Structure for a Reciprocal Write
Table 10.10: Structure of a Small malloc Chunk

Chapter 12: HP Tru64 Unix Exploitation

Table 12.1: Tru64 General Purpose Registers
Table 12.2: Alpha Instructions for Assembling Payload Components

Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages

Table 16.1: Integer Conversion Table

Chapter 20:   Alternative Payload Strategies

Table 20.1: How a Syscall Proxy Works
Table 20.2: Overview of the Syscall Proxy


The Shellcoder's Handbook. Discovering and Exploiting Security
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 198
Authors: Neal Krawetz

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net