The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half o
597 115 3MB
English Pages 512 Year 2005
Table of contents :
Content: Cover
Contents
Foreword
Chapter 1 Buffer Overflows: The Essentials
Chapter 2 Understanding Shellcode
Chapter 3 Writing Shellcode
Chapter 4 Win32 Assembly
Section 1 Case Studies Case Study 1.1 FreeBsd Nn Exploit Code
Chapter 5 Stack Overflows
Chapter 6 Heap Corruption
Chapter 7 Format String Attacks
Chapter 8 Windows Buffer Overflows
Section 2 Case Studies Case Study 2.1 cUrl Buffer Overflow on Linux
Chapter 9 Finding Buffer Overflows in Source
Section 3 Case Studies Case Study 3.1 InlineEgg I
Appendix A The Complete Data Conversion Table
Appendix B Useful Syscalls.