Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Für diesen Artikel ist leider kein Bild verfügbar.

Hacking Binary Programs and Exploit Analysis

(Autor)

Buch | Hardcover
300 Seiten
2021
Crc Press Inc (Verlag)
978-0-8153-9239-2 (ISBN)
CHF 219,95 inkl. MwSt
  • Titel wird leider nicht erscheinen
  • Artikel merken
This book provides the reader a dynamic educational experience focused on stack based binary exploits. It provides a guide for educators in developing course syllabi and coursework for students. The goal of this book can further the education of important security topics of binary exploits focused on the execution stack of a program. The book will feature rich text descriptions paired with end-of-chapter exercises and comprehensive live examples with a ready-made Virtual Machine image that can be used directly for instruction. Readers will also develop new skills in how to analyze programs for such vulnerabilities, and how to exploit programs to executie arbitrary code.

Adam J. Aviv is an assistant professor at the United States Naval Academy. He received his Ph.D from the University of Pennsylvania, and his research area is in mobile device authentication. He has worked and published on varied topics, including applied cryptography, network security, and electronic voting. He is perhaps best known for his analysis of vulnerabilities in graphical password on touch screen devices, so call "smudge attacks."

Unit 1: Understanding the Execution Stack and Binary Programs: 1. Binary Programs and Tools of Analysis, 2. C Programming Primer, 3. Hello Assembly and Reversing, 4. Execution Stack and Return Addresses, 5. Butters and Stack Smashing; Unit 2: Shell Code and Loading Shell Code, 6. What is shell code?, 7. Writing Shell Code, smaller and smaller, 8. Shell Code Variants: Remote Shell Code, 9. Obfuscated Shell Code, 10. Egg Hunt Shell Code, 11. Using the environment, 12. Format String Attacks; Unite 3: Defenses and Subverting those Defenses, 13. Address Space Layout Randomization (ASLR), 14. Non-Executable Stack: Return to LIb C, 15. Global Offset Table, 16. Return Oriented Programming, 17. Stack Pivoting

Erscheinungsdatum
Reihe/Serie Chapman & Hall/CRC Cryptography and Network Security Series
Zusatzinfo 20 Illustrations, black and white
Verlagsort Bosa Roca
Sprache englisch
Maße 156 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Mathematik Logik / Mengenlehre
ISBN-10 0-8153-9239-7 / 0815392397
ISBN-13 978-0-8153-9239-2 / 9780815392392
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20