Index

A note on the digital index

A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.

C

Celestial (Apple iOS audio framework), 8.1 Vulnerability Discovery
checksec.sh, Detecting Exploit Mitigation Techniques
Cisco, Browse and You’re Owned, 5.3 Vulnerability Remediation
Common Vulnerabilities and Exposures Identifiers (CVE-IDs), 2.5 Addendum, 2.5 Addendum, 3.5 Addendum, 4.5 Addendum, 5.2 Exploitation, 6.5 Addendum, 7.5 Addendum, 8.2 Crash Analysis and Exploitation
CVE-2007-4686, 7.5 Addendum
CVE-2008-1625, 6.5 Addendum
CVE-2008-3558, 5.2 Exploitation
CVE-2008-4654, 2.5 Addendum
CVE-2008-568, 3.5 Addendum
CVE-2009-0385, 4.5 Addendum
CVE-2010-0036, 8.2 Crash Analysis and Exploitation
COMRaider, Step 1: List the Registered WebEx Objects and Exported Methods
coordinated disclosure, 2.3 Vulnerability Remediation
Core Audio (Apple iOS audio framework), 8.1 Vulnerability Discovery
cross-site scripting (XSS), Step 2: Test the Exported Methods in the Browser
CTL_CODE, Step 5: Find the User-Controlled Input Values
CurrentStackLocation, Step 4: List the IOCTLs
CVE-IDs. See Common Vulnerabilities and Exposures Identifiers, 2.3 Vulnerability Remediation
Cygwin environment, 2.3 Vulnerability Remediation

D

Data Execution Prevention (DEP), 2.3 Vulnerability Remediation, C.1 Exploit Mitigation Techniques
data transfer type, Step 5: Find the User-Controlled Input Values
debuggers, 1.4 Tools of the Trade, Debuggers, Debuggers, Debuggers, Debuggers, Debuggers, Step 3: Manipulate the TiVo Movie File to Crash VLC, Step 1: Trigger the NULL Pointer Dereference for a Denial of Service, Step 3: Find the Object Methods in the Binary, Step 4: List the IOCTLs, Step 5: Find the User-Controlled Input Values, 6.2 Exploitation, Step 1: Trigger the Bug to Crash the System (Denial of Service), Step 2: Build a Simple Fuzzer and Fuzz the Phone, Debugging, B.2 The Windows Debugger (WinDbg), B.4 The GNU Debugger (gdb)
Immunity Debugger, Debuggers, Step 3: Manipulate the TiVo Movie File to Crash VLC
OllyDbg, Debuggers
The GNU Debugger (gdb), Debuggers, Step 1: Trigger the Bug to Crash the System (Denial of Service), Step 2: Build a Simple Fuzzer and Fuzz the Phone, B.4 The GNU Debugger (gdb)
The Modular Debugger (mdb), Debuggers, Step 1: Trigger the NULL Pointer Dereference for a Denial of Service, Debugging
WinDbg, Debuggers, Step 3: Find the Object Methods in the Binary, Step 4: List the IOCTLs, Step 5: Find the User-Controlled Input Values, 6.2 Exploitation, B.2 The Windows Debugger (WinDbg)
demuxer, 2.1 Vulnerability Discovery, 4.1 Vulnerability Discovery
DEP (Data Execution Prevention), 2.3 Vulnerability Remediation, Mitigation
DeviceIoControl(), Step 4: List the IOCTLs
Direct Kernel Object Manipulation (DKOM), 6.2 Exploitation
disassemblers, Debuggers
DispCallFunc(), Step 3: Find the Object Methods in the Binary
DKOM (Direct Kernel Object Manipulation), 6.2 Exploitation
double frees, 1.3 Memory Errors
DriverView, Step 2: Generate a List of the Drivers and Device Objects Created by avast!
DRIVER_OBJECT, Step 4: List the IOCTLs
dynamic analysis, 1.2 Common Techniques

H

heap buffer overflows, A.1 Stack Buffer Overflows
heap mitigation techniques, C.1 Exploit Mitigation Techniques
heap spraying techniques, 5.2 Exploitation, Step 4: Get Control over EIP
heap-memory management, 1.3 Memory Errors

Q

QuickTime (File Format Specification), 8.2 Crash Analysis and Exploitation