The Shellcoder's Handbook : Discovering and Exploiting Security Holes

Pop Culture Lists

QPC / Book / The Shellcoder's Handbook : Discovering and Exploiting Security Holes


?

The Shellcoder's Handbook : Discovering and Exploiting Security Holes

Author: Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell
Binding: Paperback
Published: 22 March, 2004
ISBN: 0764544683

$34.00


?

The Shellcoders Handbook : Discovering and Exploiting Security Holes

The Shellcoder's Handbook : Discovering and Exploiting Security Holes
by: Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan "noir" Eren, Neel Mehta, Riley Hassell

Customer Reviews:

Avg. Customer Rating: 4.4 / 5.0

Excellent security book although misleading title:

The title "Shellcoder's handbook" made me reluctant to even buy this book. I thought it would go about explaining exploiting stack, heap overruns, bypassing memory exploitation methods and so on in order to execute shell code: basically, a book for hacking and I didn't like that. Nonetheless, it took me a glance of the list of authors and the table of contents to realize that this book goes beyond exploitation and into core penetration testing and vulnerability discovery methods. Hopefully, like rational... more info

Yes! The Real Deal is Here!:

Here's how this wonderful learning resource is laid out:

PART 1 INTRO TO EXPLOITATION ON LINUX x86

1) Before You Begin
2) Stack Overflows
3) Shellcode
4) Introduction to Format String Bugs
5) Introduction to Heap Overflows

PART 2 EXPLOITING MORE PLATFORMS: Windows, Solaris, and Tru64

6) The Wild World of Windows
7) Windows Shellcode
8) Windows Overflows
9) Overcoming Filters
10) Introduction to Solaris Exploitation
11) Advanced Solaris Exploitation
12) HP Tru64 Unix... more info

Good material... bad editing:

While the material is good, there are way to many errors. For someone who's looking for the hows and whats of software exploitation, this book comes through. For someone who actually wants to follow their example code... good luck. Errors everywhere! I wonder how this book made it past the editors. I haven't come across a book like this in a long long time. The webpage also lacks much content save for the chapter code, some of which is faulty and will not run properly without modification.

Get some new... more info


Similar Products:

Exploiting Software : How to Break Code Exploiting Software : How to Break Code
by Greg Hoglund, Gary McGraw
Hacker Disassembling Uncovered Hacker Disassembling Uncovered
by Kris Kaspersky, Natalia Tarkova, Julie Laing
Hacking: The Art of Exploitation Hacking: The Art of Exploitation
by Jon Erickson
Security Warrior Security Warrior
by Cyrus Peikari, Anton Chuvakin
Malware: Fighting Malicious Code Malware: Fighting Malicious Code
by Ed Skoudis, Lenny Zeltser
?
PortionsAmazon.com, Inc.



In association with