|
Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM. |
|
|
| | The Essential Guide to Computer Data Storage: From Floppy to DVDA world without data storage is like a mankind without memory. Thanks to various information storage methods developed in the last 22,000 years, we are able to document our history, to learn from each other's experience, and, ultimately, to create the world as it is today.
The future of computing is... | | Google Web Toolkit ApplicationsAccelerate and Simplify Ajax Development with Google Web Toolkit
Get the edge you need to deliver exceptional user experiences with Google™ Web Toolkit Applications, a guidebook that provides web developers with core information and... |
|