000 | 03143cam a22002654a 4500 | ||
---|---|---|---|
001 | 406 | ||
003 | OSt | ||
005 | 20250129105248.0 | ||
008 | 030801s2003 caua b 001 0 eng | ||
020 | _a1593270070 | ||
040 |
_aDLC _cDLC _dIQ_MoCLU _beng _erda |
||
082 | 0 | 0 |
_a005.8 _223 _bE68 |
100 | 1 |
_aErickson, Jon, _d1977- |
|
245 | 1 | 0 |
_aHacking : _bthe art of exploitation / _cby Jon Erickson. |
264 |
_a[San Francisco] : _bNo Starch Press, _c2003. |
||
300 |
_a xi, 241 pages : _billustrations ; _c23 cm. |
||
504 | _aIncludes bibliographical references and index. | ||
505 | _aProgramming Program Exploitation Generalized Exploit Techniques Multi-User File Permissions Memory Memory Declaration Null Byte Termination Program Memory Segmentation Buffer Overflows Stack-Based Overflows Exploiting Without Exploit Code Using the Environment Heap- and bss-Based Overflows A Basic Heap-Based Overflow Overflowing Function Pointers Format Strings Format Strings and printf() The Format-String Vulnerability Reading from Arbitrary Memory Addresses Writing to Arbitrary Memory Addresses Direct Parameter Access Detours with dtors Overwriting the Global Offset Table Writing Shellcode Common Assembly Instructions Linux System Calls Hello, World! Shell-Spawning Code Avoiding Using Other Segments Removing Null Bytes Even Smaller Shellcode Using the Stack Printable ASCII Instructions Polymorphic Shellcode ASCII Printable Polymorphic Shellcode Dissembler Returning into libc Returning into system() Chaining Return into libc Calls Using a Wrapper Writing Nulls with Return into libc Writing Multiple Words with a Single Call Networking OSI Model Interesting Layers in Detail Network Layer Transport Layer Data-Link Layer Network Sniffing Active Sniffing TCP/IP Hijacking RST Hijacking Denial of Service The Ping of Death Teardrop Ping Flooding Amplification Attacks Distributed DoS Flooding SYN Flooding Port Scanning Stealth SYN Scan FIN, X-mas, and Null Scans Spoofing Decoys Idle Scanning Proactive Defense (Shroud) Cryptology Information Theory Unconditional Security One-Time Pads Quantum Key Distribution Computational Security Algorithmic Runtime Asymptotic Notation Symmetric Encryption Lov Grover's Quantum Search Algorithm Asymmetric Encryption RSA Peter Shor's Quantum Factoring Algorithm Hybrid Ciphers Man-in-the-Middle Attacks Differing SSH Protocol Host Fingerprints Fuzzy Fingerprints Password Cracking Dictionary Attacks Exhaustive Brute-Force Attacks Hash Lookup Table Password Probability Matrix Wireless 802.11 b Encryption Wired Equivalent Privacy (WEP) RC4 Stream Cipher WEP Attacks Offline Brute-Force Attacks Keystream Reuse IV-Based Decryption Dictionary Tables IP Redirection Fluhrer, Mantin, and Shamir (FMS) Attack | ||
520 | _aDescribes the techniques of computer hacking, covering such topics as stack-based overflows, format string exploits, and shellcode. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aHackers. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
910 | _aدينا | ||
942 |
_2ddc _cBK _n0 |
||
999 |
_c406 _d406 |