Foster J.C. - Sockets, Shellcodes, Porting & Coding [2005, PDF, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
0 1 112.33 МБ
Аватара пользователя
Сообщения: 25934
Зарегистрирован: 05 ноя 2011, 22:02

Foster J.C. - Sockets, Shellcodes, Porting & Coding [2005, PDF, ENG]

Сообщение Nik » 28 дек 2013, 00:52

Sockets, Shellcodes, Porting & Coding

Год: 2005
Автор: James C. Foster
Жанр: Учебник/Пособие
Издательство: Syngress publishing
ISBN: 1597490059
Формат: PDF
Качество: Отсканированные страницы
Количество страниц: 668
Описание: Elite Programming Techniques Demystified

In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.

“Read every page of this book, understand the content, and use it to your advantage.”—Stuart McClure
Доп. информация: Download the Code
All code lines throughout the book are numbered for easy reference and are available for download from

· Develop Shellcode
Customize and optimize never-before-seen shellcode that can exploit almost any system.

· Port Public Exploits
Follow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!

· Customize Windows COM Objects
Wrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.

· Enhance Nikto
Develop customized code to dramatically improve the performance of the Nikto Web server scanner.

· Reverse Engineer Zero Days
Learn to reverse engineer, modify, and re-automate Zero-Day exploit code.

· Write NASL Scripts
Develop scripts for Nessus to discover the latest vulnerabilities.

· Identify and Target Vulnerabilities
Examine case studies that reveal how attackers identify and exploit security holes.

· Master Sockets
Detailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Примеры страниц
У вас нет необходимых прав для просмотра вложений в этом сообщении.