Umfrageergebnis anzeigen: Wie wuerdest du das Buch bewerten?

4. Du darfst bei dieser Umfrage nicht abstimmen
  • Excellent

    2 50,00%
  • Gut

    1 25,00%
  • OK

    1 25,00%
  • Schlecht

    0 0%
  • Miserabel

    0 0%
Ergebnis 1 bis 2 von 2

Thema: The Shellcoder's Handbook: Discovering and Exploiting Security Holes

  1. #1
    Registriert seit
    May 2000

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    Book Description
    Uncover, exploit, and close security holes in any software or operating system Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring. The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, you'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed." The Shellcoder's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniques

    Siehe auch hier:

  2. #2
    Trial User
    Registriert seit
    Jan 2007

    Re: The Shellcoder's Handbook: Discovering and Exploiting Security Holes

    Gibt es das buch auch auf Deutsch ??

Aktive Benutzer

Aktive Benutzer

Aktive Benutzer in diesem Thema: 1 (Registrierte Benutzer: 0, Gäste: 1)

Ähnliche Themen

  1. Exploiting Software: How to Break Code
    Von Boardleitung im Forum Buch Tipp
    Antworten: 0
    Letzter Beitrag: 06.04.2006, 13:14
  2. Win32 Exploiting
    Von master2000 im Forum (In)Security allgemein
    Antworten: 10
    Letzter Beitrag: 17.12.2004, 08:15
  3. Antworten: 6
    Letzter Beitrag: 03.11.2003, 23:16
  4. cgi scanner holes
    Von Mezzocrash im Forum (In)Security allgemein
    Antworten: 5
    Letzter Beitrag: 11.05.2001, 00:35
  5. CGI - exploiting
    Von ascii im Forum (In)Security allgemein
    Antworten: 1
    Letzter Beitrag: 02.05.2001, 16:55


  • Neue Themen erstellen: Nein
  • Themen beantworten: Nein
  • Anhänge hochladen: Nein
  • Beiträge bearbeiten: Nein