Search -
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets Shellcode Porting and Coding Reverse Engineering Exploits and Tool Coding for Security Professionals Author:James C. Foster, Stuart McClure Elite Programming Techniques DemystifiedIn this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against ... more »the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools. "Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure
Download the Code All code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.
Develop Shellcode Customize and optimize never-before-seen shellcode that can exploit almost any system.
Port Public Exploits Follow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!
Customize Windows COM Objects Wrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.
Enhance Nikto Develop customized code to dramatically improve the performance of the Nikto Web server scanner.
Reverse Engineer Zero Days Learn to reverse engineer, modify, and re-automate Zero-Day exploit code.
Write NASL Scripts Develop scripts for Nessus to discover the latest vulnerabilities.
Identify and Target Vulnerabilities Examine case studies that reveal how attackers identify and exploit security holes.
Your Solutions Membership Gives You Access to:A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page"From the Author" Forum where the authors post timely updates and links to related sitesThe complete code listings from the bookDownloadable chapters from these best-selling books:Buffer Overflow Attacks: Detect, Exploit, PreventProgrammer's Ultimate Security DeskRefHacking the Code: ASP.NET Web Application SecurityNessus Network Auditing TABLE OF CONTENTS:Security CodingNASL ScriptingBSD SocketsWindows Sockets (Winsock)Java SocketsWriting Portable CodePortable Network ProgrammingWriting Shellcode (I and II)Writing Exploits (I, II, and III)Writing Security ComponentsCreating a Web Security ToolGlossarySecurity Tool CompendiumExploit ArchivesSyscall ReferenceData Conversion Reference« less