Deep Dive: The Development of an Exploit
(Win32)
2015
BoD – Books on Demand (Verlag)
978-3-7386-2009-2 (ISBN)
BoD – Books on Demand (Verlag)
978-3-7386-2009-2 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
Cyber crime is on everyone's lips. It's in the daily news, and every week society gets overwhelmed with information about hacking attacks, industrial espionage, unavailable IT services, and imprisonment of IT criminals. Not least the NSA affair has widely contributed to the "popularity" of headlines about spying out other nations' administrations, companies and citizens.
But scarcely anybody understands what a hacker is doing at all. What the heck is hacking actually?
This book is a story about exploit development. It demonstrates how a hacker exploits a browser vulnerability, step-by-step.
Starting with the crash time analysis of a vulnerable program, the author develops an exploit and shows blow-by-blow how a hacker thinks; what problems come up, and how an attacker can bypass the security protection mechanisms of the operating system.
This book is highly technical! The reader is required to have a slightly perverse inclination to read debug messages, memory addresses and assembler instructions.
If you're interested in hacking, you will get a quite good understanding about what hacking is in practice.
If you're a newbie to Win32 hacking, roll up your sleeves and become a hacker! Learn about shellcode, and how to bypass ASLR and DEP!
If you're part of the InfoSec community, have a good reading. This is no theory, this is deep dive!
But scarcely anybody understands what a hacker is doing at all. What the heck is hacking actually?
This book is a story about exploit development. It demonstrates how a hacker exploits a browser vulnerability, step-by-step.
Starting with the crash time analysis of a vulnerable program, the author develops an exploit and shows blow-by-blow how a hacker thinks; what problems come up, and how an attacker can bypass the security protection mechanisms of the operating system.
This book is highly technical! The reader is required to have a slightly perverse inclination to read debug messages, memory addresses and assembler instructions.
If you're interested in hacking, you will get a quite good understanding about what hacking is in practice.
If you're a newbie to Win32 hacking, roll up your sleeves and become a hacker! Learn about shellcode, and how to bypass ASLR and DEP!
If you're part of the InfoSec community, have a good reading. This is no theory, this is deep dive!
Manu Carus: Manu Carus is IT security professional, ethical hacker, IT auditor, and forensics investigator, working for many years in the InfoSec field (CISSP, CISM, CISA, CEH, E CSA, CHFI). His passion is X-raying the dark side of the Internet, having fun on analyzing and implementing smart code.
Erscheint lt. Verlag | 6.7.2015 |
---|---|
Sprache | englisch |
Gewicht | 481 g |
Themenwelt | Sachbuch/Ratgeber ► Natur / Technik ► Technik |
Schulbuch / Wörterbuch ► Lexikon / Chroniken | |
Technik | |
Schlagworte | Buffer Overflow • cybercrime • Exploit • Hacking • heap spray • Metasploit • security • Shellcode |
ISBN-10 | 3-7386-2009-5 / 3738620095 |
ISBN-13 | 978-3-7386-2009-2 / 9783738620092 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
die wichtigsten Begriffe, Bautypen und Bauelemente
Buch | Softcover (2024)
Prestel (Verlag)
CHF 44,75
vom Kolosseum über die Akropolis bis zur Alhambra
Buch | Hardcover (2023)
DK (Verlag)
CHF 29,90