Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
The Shellcoder’s Handbook
About the Authors
Credits
Acknowledgments
Contents
Introduction to the Second Edition
Part I: Introduction to Exploitation: Linux on x86
Chapter 1: Before You Begin
Recognizing C and C++ Code Constructs in Assembly
Conclusion
Chapter 2: Stack Overflows
Buffers
The Stack
Overflowing Buffers on the Stack
An Interesting Diversion
Using an Exploit to Get Root Privileges
Defeating a Non-Executable Stack
Chapter 3: Shellcode
Understanding System Calls
Writing Shellcode for the exit() Syscall
Injectable Shellcode
Spawning a Shell
Chapter 4: Introduction to Format String Bugs
What Is a Format String Bug?
Format String Exploits
Controlling Execution for Exploitation
Why Did This Happen?
Format String Technique Roundup
Chapter 5: Introduction to Heap Overflows
What Is a Heap?
Finding Heap Overflows
Part II: Other Platforms—Windows, Solaris, OS/X, and Cisco
Chapter 6: The Wild World of Windows
Heaps
The Genius and Idiocy of the Distributed Common Object Model and DCE-RPC
Debugging Windows
Chapter 7: Windows Shellcode
Setting Up
Popping a Shell
Chapter 8: Windows Overflows
Stack-Based Buffer Overflows
Abusing Frame-Based Exception Handling on Windows 2003 Server
Stack Protection and Windows 2003 Server
Heap-Based Buffer Overflows
Exploiting Heap-Based Overflows
Other Overflows
Exploiting Buffer Overflows and Non-Executable Stacks
Chapter 9: Overcoming Filters
Writing Exploits for Use with a Unicode Filter
Exploiting Unicode-Based Vulnerabilities
← Prev
Back
Next →
← Prev
Back
Next →