Buch, Englisch, 300 Seiten, Format (B × H): 156 mm x 235 mm
Reihe: Chapman & Hall/CRC Cryptography and Network Security Series
Buch, Englisch, 300 Seiten, Format (B × H): 156 mm x 235 mm
Reihe: Chapman & Hall/CRC Cryptography and Network Security Series
ISBN: 978-1-138-19759-6
Verlag: Taylor & Francis Ltd
This book provides the reader a dynamic educational experience focused on stack based binary exploits. It provides a guide for educators in developing course syllabi and coursework for students. The goal of this book can further the education of important security topics of binary exploits focused on the execution stack of a program. The book will feature rich text descriptions paired with end-of-chapter exercises and comprehensive live examples with a ready-made Virtual Machine image that can be used directly for instruction. Readers will also develop new skills in how to analyze programs for such vulnerabilities, and how to exploit programs to executie arbitrary code.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Unit 1: Understanding the Execution Stack and Binary Programs: 1. Binary Programs and Tools of Analysis, 2. C Programming Primer, 3. Hello Assembly and Reversing, 4. Execution Stack and Return Addresses, 5. Butters and Stack Smashing; Unit 2: Shell Code and Loading Shell Code, 6. What is shell code?, 7. Writing Shell Code, smaller and smaller, 8. Shell Code Variants: Remote Shell Code, 9. Obfuscated Shell Code, 10. Egg Hunt Shell Code, 11. Using the environment, 12. Format String Attacks; Unite 3: Defenses and Subverting those Defenses, 13. Address Space Layout Randomization (ASLR), 14. Non-Executable Stack: Return to LIb C, 15. Global Offset Table, 16. Return Oriented Programming, 17. Stack Pivoting