Flylib.com
Shellcoders Programming Uncovered (Uncovered series)
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
Shellcoders Programming Uncovered
Back Cover
About
Introduction
Part I: Introduction to Shellcoding
Chapter 1: Required Tools
Programming Languages
Analysis, Debugging, and Reverse-Engineering Tools
Must-Read Books and Other References
Chapter 2: Assembly Language -- Quick Start
Assembly Language Philosophy
Explaining Assembly Concepts on C Examples
Assembly Inserts as a Workbench
Chapter 3: Hacking Using GPRS Uncovered
Hacking Using GPRS
Part II: Overflow Errors
Chapter 4: Buffers Subject to Overflow (Lane of Monsters)
Classifying Overflow Errors (Terrible Boredom)
Historical Inevitability of Overflow Errors
Myths and Legends about Overflow Errors
Goals and Possibilities of Attacks
Chapter 5: Exploiting SEH
Brief Information about Structured Exceptions
Capturing Control
Suppressing Abnormal Application Termination
Chapter 6: Specifiers Under Control
Functions Supporting Formatted Output
Cfingerd Patch
Sources of Potential Threat
Chapter 7: Practical Overflow Example
Source of the Threat
Technical Details
Exploit
Reanimating the Exploit
Developing Shellcode
Victory or Defeat
Where Do You Go from Here?
Chapter 8: Searching for Overflowing Buffers
Buried Under a Pile of Printouts
Adventure of Binary Code
Practical Example of an Overflow Error
Chapter 9: Methods of Protecting Buffers Against Overflow
Antihacking Techniques
Problems with Memory Allocation
Part III: Secrets of Designing Shellcode
Chapter 10: Shellcoding Problems
Size Is Important
Searching for Yourself
Technique of Calling System Functions
Interesting References on Shellcoding
Chapter 11: The Technique of Writing Portable Shellcode
Requirements for Portable Shellcode
Ways of Achieving Portability
Drawbacks of Hard-Encoding
Direct Search in Memory
Over Open Sights: PEB
Unwinding the SEH Stack
Native API
Different Methods of Ensuring Portability
Chapter 12: Self-Modification Basics
Principles of Building Self-Modifying Code
Chapter 13: Playing Hide-and-Seek Under Linux
Loadable Kernel Modules
Excluding Processes from the Task List
Trapping System Calls
Trapping Requests to the File System
When Modules Are Unavailable
Other Methods of Disguise
Chapter 14: Capturing Ring 0 Under Linux
Honest Ways of Hacking
Kernel Bluetooth Local Root Exploit for Linux
ELFs Fall into the Dump
Problems with Multithreading
Getting Root on Multiprocessor Machines
Interesting Resources
Chapter 15: Compiling and Decompiling Shellcode
Decompiling Shellcode
Part IV: Network Worms and Local Viruses
Chapter 16: Life Cycle of a Worm
Initialization, or Some Words before the Real Introduction
Introduction to Worms
Chapter 17: Local Viruses in the UNIX World
Conditions Required for Support of Virus Activity
Chapter 18: Viruses in Scripts
Chapter 19: ELF Files
ELF File Structure
General Structure and Strategy of Virus Behavior
Chapter 20: Method of Capturing Control
Insertion of the Virus Code Near the Entry Point
Modification of the Import Table
Chapter 21: Main Symptoms of Virus Infection
How Helpful are Antivirus Programs?
Internet Resources Related to Virus Infection
Chapter 22: Simplest Windows NT Virus
The Algorithm of Virus Operation
Source Code of a Lab Virus
Compiling and Testing the Virus
Enumerating Streams
Useful Resources
Part V: Firewalls, Honeypots, and Other Protection Systems
Chapter 23: Bypassing Firewalls
Threats the Firewalls Can and Cannot Protect Against
Detecting and Identifying a Firewall
Scanning and Tracing through the Firewall
Penetrating the Firewall
Links Related to Firewalls
Chapter 24: Escaping through the Firewall
Firewall Dos and Don ts
Establishing a Connection to the Remote Host
Chapter 25: Organizing a Remote Shell Under UNIX and Windows NT
Blind Shell
Fully Functional Shell
Chapter 26: Hackerz Love Honey
What Is in the Pot?
Preparing for an Attack
Casting Light on Honeypots
Deceitful Manoeuvres
Attack at the Honeypot
Drowned in the Honey
Chapter 27: Sniffing a LAN
Passive Sniffing
Active Sniffing or ARP Spoofing
Cloning Network Adapters
Cloning Network Adapters
Sniffing Dial-up Traffic
When Sniffers Are Useless
Stealth Sniffing
Resources Related to Sniffing
Chapter 28: Databases Under Attack
Weak Password-Encryption Algorithms
Password Sniffing
Hacking a Script
Imposing a Query or SQL Injection
How To Detect the Presence of an SQL Server
Counteracting Intrusion
Part VI: Exotic Objects for Insertion
Chapter 29: Attacking Bluetooth
What Is Bluetooth?
Sharpshooting Antenna
Authorization and Authentication
Methods of Attack
Overview of Bluetooth Hacking Tools
Chapter 30: Economizing on GPRS
Working through a Proxy Server
Google Web Accelerator
Tunneling through Telnet
Tunneling through ICMP
Chapter 31: Legends and Myths about Flashing BIOS
Benefits of BIOS Updates
When To Upgrade BIOS
Hacking BIOS
Chapter 32: Viruses Infecting BIOS
How To Proceed
Inside BIOS
Baptizing by Fire, or Creating an ISA ROM Module
Modifying the Boot Block
System Overclocking
Useful Links Related to BIOS
CD Description
List of Figures
List of Tables
List of Listings
CD Content
Shellcoders Programming Uncovered (Uncovered series)
ISBN: 193176946X
EAN: 2147483647
Year: 2003
Pages: 164
Authors:
Kris Kaspersky
BUY ON AMAZON
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 2 Diagnosing and Troubleshooting
Domain 6 Basic Networking
Domain 1 Operating System Fundamentals
Domain 3 Diagnosing and Troubleshooting
Network Security Architectures
Identity Deployment Recommendations
Network Design Refresher
Expected Threats
Organizational Realities
Guidelines on Antivirus Process
C++ How to Program (5th Edition)
Terminology
public, protected and private Inheritance
namespaces
Exercises
L.5. The Autos Window
Programming Microsoft ASP.NET 3.5
The ADO.NET Object Model
Paging Through Data Sources
Real-World Data Access
ASP.NET State Management
Data-Bound and Templated Controls
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Transmission Lines
The Electromagnetic Spectrum and Bandwidth
The Transport Network Infrastructure
DSL Technology
Wireless Broadband
.NET-A Complete Development Cycle
Analysis of the Photo Editor Requirements
Conclusion
Analysis of the Image Postprocessing Requirements
Requirements for Performance Optimization
Putting It All Together
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies