Operating Systems
Programming Languages
Microsoft Technologies
Computer Science
Software Engineering
Web Programming
Web Technologies

Contact Us | What's New | Missing Link | Feedback


Book Title : Writing Security Tools And Exploits
eBook download format(s) : rar
ISBN-10 : 1597499978 
ISBN-13 : 978-1-597499-97-2 
Author(s) : James C. Foster
Publisher : Syngress Publishing (Sep 2005)
Section : Internet
Book Review:

Book Description
Learn to Write the Security Tools the Other Books Only Teach You to Use

Exploits. In information technology circles, the term exploits has become synonymous with vulnerabilities. It is a scary word that can keep you up at night wondering if you have purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and patched your entire environment. It's also a topic that can enter the security water-cooler discussions faster than McAfee's new wicked antivirus software or Symantec's latest acquisition. Exploits are proof that the computer science or software programming community still does not have an understanding of how to design, create, and implement secure code.

  • Write Solid Shellcode
    Learn the techniques used to make the most out of vulnerabilities by employing the correct shellcode.
  • Reverse Connection Shellcode
    See how reverse connection shellcode makes a connection from a hacked system to a different system where it can be caught using network tools such as netcat.
  • Buffer Overflow Exploits
    Find techniques to protect against buffer overflows such as allocating buffers for string operations dynamically on the heap.
  • Heap Overflows
    Heap overflows have become the most prominent software security bugs. See how they can have varying exploitation techniques and consequences.
  • Format Strings
    Format string vulnerabilities occur when programmers pass externally supplied data to a print f function (or similar) as part of the format string argument.
  • Race Conditions
    Nearly all race condition exploits are written from a local attacker's perspective and have the potential to escalate privileges, overwrite files, or compromise protected data.
  • Exploitable Integer Bugs
    See how integer bugs are harder for a researcher to spot than stack overflow vulnerabilities and learn why the implications of integer calculation errors are less understood by developers as a whole.
  • Code for Nessus
    Use NASLs to check for security vulnerabilities or misconfigurations.
  • Metasploit Framework (MSF)
    Use MSF and its components, msfweb, msfconsole, and msfcli, as an exploitation platform.
  • Meterpreter Extensions
    Use the power of the Meterpreter payload system to load custom-written DLLs into an exploited process's address space.

  • Password: ganelon

    add to                 Digg!

    You may use anyone of the download options

    eBook VersionBuy this book from Amazon
    Front Cover

    Missing Link?, Report It and you may wish to  Buy  this book from amazon

    Tell a Friend!

    Similar Book titles in Internet section:
    Practical UNIX & Internet Security
    Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
    Computer Security Basics 2nd Edition
    Extreme Exploits Advanced Defenses Against Hardcore Hacks
    Google Hacks: Tips & Tools for Finding and Using the World's Information
    The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology
    Google Advertising Tools Cashing in with Adsense, Adwords, and the Google APIs
    Maximum Wireless Security
    Google Hacks: 100 Industrial-Strength Tips & Tools

    Similar Book titles in Other sections:

    Section: CS -> Compilers and Languages
    Functional Programming and Parallel Graph Rewriting

    Section: Device Drivers
    Introduction to Writing Windows CE Display Drivers
    Writing a Linux device driver
    Writing Device Drivers Book for the Solaris 8 OS
    Writing Device Drivers Book for the Solaris 9 OS
    Writing PCMCIA Device Drivers
    Show all..

    Section: Microprocessor
    Assembly Language Programming Tools for the IA-64 Architecture

    Section: Peripherals
    Writing Drivers for the DP8390 NIC Family of Ethernet Controllers

    Section: Java Networking
    JAVA 2 Network Security

    Section: Mathematics
    Lapack Users' Guide (Software, Environments and Tools, 9)

    Section: Miscellaneous
    Handbook of Information Security Management
    PDF Hacks: 100 Industrial-Strength Tips & Tools

    Section: Microsoft .(dot) net
    The .NET Developer's Guide to Windows Security
    Improving Web Application Security: Threats and Countermeasures

    Section: Networking
    Introduction to Computer, Internet & Network Systems Security
    Cisco - Designing Network Security
    Cisco Secure Internet Security Solutions
    Router Security Configuration Guide
    Cisco Security Specialist's Guide to PIX Firewalls
    Show all..

    Section: GNU/Linux OS
    Security in Open Systems
    Writing GNOME Applications
    The Linux Administrator's Security Guide
    Get Acquainted with Linux Security and Optimization System
    Linux Security for Beginners
    Show all..

    Section: Mac OS X
    Maximum Mac OS X Security
    Mac OS X Power Tools, Second Edition

    Section: Solaris OS
    Writing Device Drivers

    Section: Unix OS
    Unix Power Tools

    Section: C Language
    Writing Bug-Free C Code for Windows: A Programming Style That Automatically Detects Bugs in C Code

    Section: Perl Scripting
    Effective Perl Programming: Writing Better Programs With Perl
    Perl 5 Pocket Reference, 3rd Edition: Programming Tools
    Writing Perl Modules for CPAN

    Section: Redbooks Draft
    Supporting On Demand Business Applications with IBM's Problem Determination Tools (APA, DT, DT - Advanced Facilities, FA, FM, File Export, WS)
    Enterprise Security Architecture using IBM ISS Security Solutions
    Enterprise Security Architecture Using IBM Tivoli Security Solutions
    WebSphere Application Server V6.1 Security Handbook
    Understanding SOA Security Design and Implementation
    Show all..

    Section: Redbooks
    Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement
    Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security
    Enterprise Security Architecture Using IBM Tivoli Security Solutions
    Security for Linux on System z
    Blue Gene/L: Performance Analysis Tools
    Show all..

    Section: Redpapers
    IBM System i Tools Innovation Program: Resource Guide for Modernization and Integration Tools for System i Applications
    WebSphere Application Server on z/OS and Security Integration
    Security with IBM Tivoli Access Manager V6 and IBM WebSphere Application Server V6 on IBM z/OS
    J2C Security on z/OS
    Java Message Service (JMS) Security on z/OS
    Show all..

    Section: Redpapers Draft
    Improving your WebApplication Software Development Life Cycle's Security Posture with IBM Rational AppScan
    IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide
    JKE Case Study: SOA Security and Management Scenario SOA Scenario
    Case Study: SOA Security and Management Scenario SOA Scenario
    Integrating WebSphere Service Registry and Repository with Tivoli Security Policy Manager
    Show all..

    Section: Software Engineering
    Power Tools for Technical Communication

    Similar Books from Amazon :

    Tell a Friend!

    ©2008 - Home - Privacy Policy - Program Policy, Terms and Conditions