(CHM 英文版)
by Jon Erickson
Publisher: No Starch
Pub Date: January 15, 2008
Print ISBN-13: 978-1-59-327144-2
Pages: 480
Program computers using C, assembly language, and shell scriptsCorrupt system memory to run arbitrary code using buffer overflows and format stringsInspect processor registers and system memory with a debugger to gain a real understanding of what is happeningOutsmart common security measures like nonexecutable stacks and intrusion detection systemsGain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presenceRedirect network traffic, conceal open ports, and hijack TCP connectionsCrack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
详细介绍,目录,试读,配套源码在此:http://www.nostarch.com/hacking2.htm