Shellcoder's Handbook中文版

本帖最后由 flyic 于 2014-4-17 11:50 编辑

Shellcoder's Handbook
2004 中文版


http://pan.baidu.com/s/15pcBH
http://ishare.iask.sina.com.cn/f/21663529.html
本论坛不能上传大文件,附网盘链接

Chapter relevance 34%
         The Shellcoder's Handbook—Discovering and Exploiting Security Holes  
Part 1 - Introduction to Exploitation: Linux on x86
Chapter relevance 34%         Chapter 1 - Before You Begin
Chapter 2 - Stack Overflows
Chapter 3 - Shellcode
Chapter 4 - Introduction to Format String Bugs
Chapter 5 - Introduction to Heap Overflows
Part 2 - Exploiting More Platforms: Windows, Solaris, and Tru64
Chapter 6 - The Wild World of Windows
Chapter 7 - Windows Shellcode
Chapter 8 - Windows Overflows
Chapter 9 - Overcoming Filters
Chapter 10 - Introduction to Solaris Exploitation
Chapter 11 - Advanced Solaris Exploitation
Chapter 12 - HP Tru64 Unix Exploitation
Part 3 - Vulnerability Discovery
Chapter 13 - Establishing a Working Environment
Chapter 14 - Fault Injection
Chapter 15 - The Art of Fuzzing
Chapter 16 - Source Code Auditing: Finding Vulnerabilities in C-Based Languages
Chapter 17 - Instrumented Investigation: A Manual Approach
Chapter 18 - Tracing for Vulnerabilities
Chapter 19 - Binary Auditing: Hacking Closed Source Software
Part 4 - Advanced Materials
Chapter 20 -   Alternative Payload Strategies
Chapter 21 - Writing Exploits that Work in the Wild
Chapter 22 - Attacking Database Software
Chapter 23 - Kernel Overflows
Chapter 24 - Exploiting Kernel Vulnerabilities

Thanks!

TOP