
Select an Action

Writing security tools and exploits
Title:
Writing security tools and exploits
Author:
Foster, James C.
ISBN:
9781423754985
9780080493138
9781597499972
Personal Author:
Publication Information:
Rockland, MA : Syngress, ©2006.
Physical Description:
1 online resource
Contents:
Cover; Front Matter; Contents; Chapter 1 Writing Exploits and Security Tools; Chapter 2 Assembly and Shellcode; Chapter 3 Exploits: Stack; Chapter 4 Exploits: Heap; Chapter 5 Exploits: Format Strings; Chapter 6 Writing Exploits I; Chapter 7 Writing Exploits II; Chapter 8 Coding for Ethereal; Chapter 9 Coding for Nessus; Chapter 10 Extending Metasploit I; Chapter 11 Extending Metasploit II; Chapter 12 Extending Metasploit III; Appendix A Data Conversion; Appendix B Syscall Reference; Appendix C Taps Currently; Appendix D Glossary; Index.
Abstract:
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.
Added Author:
Electronic Access:
ScienceDirect http://www.sciencedirect.com/science/book/9781597499972Available:*
Shelf Number | Item Barcode | Shelf Location | Status |
|---|---|---|---|
| QA76.9 .A25 F67 2006 EB | 1188284-1001 | Elsevier E-Book Collections | Searching... |
On Order
Select a list
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
:
Select An Item
Data usage warning: You will receive one text message for each title you selected.
Standard text messaging rates apply.


