Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Sockets, Shellcode, Porting and Coding
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Sockets, Shellcode, Porting and Coding

Sockets, Shellcode, Porting and Coding

Reverse Engineering Exploits and Tool Coding for Security Professionals

James C. Foster - Collection 4 Free Booklets Your Solutions Membership

690 pages, parution le 18/05/2005

Résumé

Elite Programming Techniques Demystified

In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.

"Read every page of this book, understand the content, and use it to your advantage."Stuart McClure

  • Download the Code
    All code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.
  • Develop Shellcode
    Customize and optimize never-before-seen shellcode that can exploit almost any system.
  • Port Public Exploits
    Follow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!
  • Customize Windows COM Objects
    Wrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.
  • Enhance Nikto
    Develop customized code to dramatically improve the performance of the Nikto Web server scanner.
  • Reverse Engineer Zero Days
    Learn to reverse engineer, modify, and re-automate Zero-Day exploit code.
  • Write NASL Scripts
    Develop scripts for Nessus to discover the latest vulnerabilities.
  • Identify and Target Vulnerabilities
    Examine case studies that reveal how attackers identify and exploit security holes.
  • Master Sockets
    Detailed code examples demonstrate socket initialization, closing sockets, reading and writing data.

L'auteur - James C. Foster

James C. Foster, Fellow is the Deputy Director of Global Security Solution Development for Computer Sciences Corporation where he is responsible for the vision and development of physical, personnel, and data security solutions. Prior to CSC, Foster was the Director of Research and Development for Foundstone Inc. (acquired by McAfee) and was responsible for all aspects of product, consulting, and corporate R&D initiatives. Prior to joining Foundstone, Foster was an Executive Advisor and Research Scientist with Guardent Inc. (acquired by Verisign) and an adjunct author at Information Security Magazine (acquired byTechTarget), subsequent to working as Security Research Specialist for the Department of Defense. With his core competencies residing in high-tech remote management, international expansion, application security, protocol analysis, and search algorithm technology, Foster has conducted numerous code reviews for commercial OS components, Win32 application assessments, and reviews on commercial-grade cryptography implementations.

Foster is a seasoned speaker and has presented throughout North America at conferences, technology forums, security summits, and research symposiums with highlights at the Microsoft Security Summit, Black Hat USA, Black Hat Windows, MIT Wireless Research Forum, SANS, MilCon, TechGov, InfoSec World 2001, and the Thomson Security Conference. He also is commonly asked to comment on pertinent security issues and has been sited in USAToday, Information Security Magazine, Baseline, Computer World, Secure Computing, and the MIT Technologist. Foster holds an A.S., B.S., MBA and numerous technology and management certifications and has attended or conducted research at the Yale School of Business, Harvard University, the University of Maryland, and is currently a Fellow at University of Pennsylvania's Wharton School of Business.

Foster is also a well published author with multiple commercial and educational papers; and has authored, contributed, or edited for major publications to include Snort 2.1 Intrusion Detection (Syngress Publishing, ISBN: 1-931836-04-3), Hacking Exposed, Fourth Edition, Anti-Hacker Toolkit, Second Edition, Advanced Intrusion Detection, Hacking the Code: ASP NET Web Application Security (Syngress, ISBN: 1-932266-65-8), Anti-Spam Toolkit, and the forthcoming Google Hacking for Penetration Techniques (Syngress, ISBN: 1-931836-36-1) .

Sommaire

  • Security Coding
  • NASL Scripting
  • BSD Sockets
  • Windows Sockets (Winsock)
  • Java Sockets
  • Writing Portable Code
  • Portable Network Programming
  • Writing Shellcode I
  • Writing Shellcode II
  • Writing Exploits I
  • Writing Exploits II
  • Writing Exploits III
  • Writing Security Components
  • Creating a Web Security Tool
  • Appendix A Glossary
  • Appendix B Security Tool Compendium
  • Appendix C Exploit Archives
  • Appendix D Syscall Reference
  • Appendix E Data Conversion Reference
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) James C. Foster
Collection 4 Free Booklets Your Solutions Membership
Parution 18/05/2005
Nb. de pages 690
Format 18 x 23,5
Couverture Broché
Poids 980g
Intérieur Noir et Blanc
EAN13 9781597490054
ISBN13 978-1-597-49005-4

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription