“…essential for administrators who want to secure computer systems under their management…” (Computer Weekly, March 2004)
"...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
View All Available Formats & Editions
Uncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help
… See more details below
Uncover, exploit, and close security holes in any software or operating system
Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.
The Shellcoder’s Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, you'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed."
The Shellcoder's Handbook shows you how to:
“…essential for administrators who want to secure computer systems under their management…” (Computer Weekly, March 2004)
"...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
Average Review: