Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Buffer Overflow Attacks: Detect, Exploit, Prevent
Contents
Foreword
Part 1 Expanding on Buffer Overflows
Chapter 1 Buffer Overflows: The Essentials
The Challenge of Software Security
Microsoft Software Is Not Bug Free
The Increase in Buffer Overflows
Exploits vsBuffer Overflows
Definitions
Software
Security
Summary
Frequently Asked Questions
Chapter 2 Understanding Shellcode
An Overview of Shellcode
The Assembly Programming Language
Analysis
Windows vsUnix Assembly
The Addressing Problem
Pushing the Arguments
The NULL Byte Problem
Implementing System Calls
System Call Arguments
System Call Return Values
Socket Descriptor Reuse Shellcode
Local Shellcode
setuid Shellcode
chroot Shellcode
Solutions Fast Track
Links to Sites
Chapter 3 Writing Shellcode
Shellcode Examples
The Write System Call
execve Shellcode
Port-Binding Shellcode
Reverse Connection Shellcode
Socket Reusing Shellcode
Reusing File Descriptors
Encoding Shellcode
Reusing Program Variables
Closed Source Programs
OS-Spanning Shellcode
Understanding Existing Shellcode
Mailing Lists
Chapter 4 Win32 Assembly
Application Memory Layout
Application Structure
Memory Allocation-Stack
Memory Allocation-Heap
← Prev
Back
Next →
← Prev
Back
Next →