lunes, 17 de diciembre de 2007

Buffer Overflow Attacks

Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker’s “vulnerability of choice”. These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of “custom exploits”. These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster.

James C. Foster’s Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel’s Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks.

Edición: Syngress (2005)
Idioma: Inglés
Formato: PDF

Contenido:

  1. Buffer Overflows: The Essentials
  2. Understanding Shellcode
  3. Writing Shellcode
  4. Win32 Assembly
  5. Case Study: FreeBSD NN Exploit Code
  6. Case Study: xlockmore User Supplied Format String Vulnerability
  7. Case Study: FrontPage Denial of Service Utilizing WinSock
  8. Case Study: cURL buffer overflow on FreeBSD
  9. Stack Overflows
  10. Heap Corruption
  11. Format String Attacks
  12. Windows Buffer Overflows
  13. Case Study: cURL buffer overflow on Linux
  14. Case Study: OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability
  15. Case Study: X11R6 4.2 XLOCALEDIR Overflow
  16. Case Study: Microsoft MDAC Denial of Service
  17. Case Study: Local UUX Buffer Overflow on HPUX
  18. Finding Buffer Overflows in Source
  19. Case Study: InlineEgg I
  20. Case Study: InlineEgg II
  21. Case Study: Seti@Home Exploit Code
  22. Case Study: Microsoft CodeBlue Exploit Code
  23. Appendix A: The Complete Data Conversion Table
  24. Appendix B: Useful Syscalls

Descarga/Download

No hay comentarios: