jump to navigation

Shellcoder’s Programming Uncovered September 15, 2008

Posted by reversengineering in E-BOOK.

Shellcoder’s Programming Uncovered
Author(s):  Kris Kaspersky
Publisher: A-List Publishing
Date     : 2005
Pages    : 500
Format   : CHM
OCR      : Yes
Quality  :
Language : English
ISBN     : 193176946X
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software’s effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.

About the Author

Kris Kaspersky is a technical writer and the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered.

Table of Contents

Shellcoder’s Programming Uncovered

Part I – Introduction to Shellcoding
Chapter 1 – Required Tools
Chapter 2 – Assembly Language – Quick Start
Chapter 3 – Hacking Using GPRS Uncovered

Part II – Overflow Errors
Chapter 4 – Buffers Subject to Overflow (Lane of Monsters)
Chapter 5 – Exploiting SEH
Chapter 6 – Specifiers Under Control
Chapter 7 – Practical Overflow Example
Chapter 8 – Searching for Overflowing Buffers
Chapter 9 – Methods of Protecting Buffers Against Overflow

Part III – Secrets of Designing Shellcode
Chapter 10 – Shellcoding Problems
Chapter 11 – The Technique of Writing Portable Shellcode
Chapter 12 – Self-Modification Basics
Chapter 13 – Playing Hide-and-Seek Under Linux
Chapter 14 – Capturing Ring 0 Under Linux
Chapter 15 – Compiling and Decompiling Shellcode

Part IV – Network Worms and Local Viruses
Chapter 16 – Life Cycle of a Worm
Chapter 17 – Local Viruses in the UNIX World
Chapter 18 – Viruses in Scripts
Chapter 19 – ELF Files
Chapter 20 – Method of Capturing Control
Chapter 21 – Main Symptoms of Virus Infection
Chapter 22 – Simplest Windows NT Virus

Part V – Firewalls, Honeypots, and Other Protection Systems
Chapter 23 – Bypassing Firewalls
Chapter 24 – Escaping through the Firewall
Chapter 25 – Organizing a Remote Shell Under UNIX and Windows NT
Chapter 26 – Hackerz Love Honey
Chapter 27 – Sniffing a LAN
Chapter 28 – Databases Under Attack

Part VI – Exotic Objects for Insertion
Chapter 29 – Attacking Bluetooth
Chapter 30 – Economizing on GPRS
Chapter 31 – Legends and Myths about Flashing BIOS
Chapter 32 – Viruses Infecting BIOS
CD Description
List of Figures
List of Tables
List of Listings


if u like all this book buy it.

About these ads


No comments yet — be the first.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


Get every new post delivered to your Inbox.

Join 45 other followers

%d bloggers like this: