Jump to content

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

Recommended Posts


Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again

A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system

Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)

Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques.

Download here: Wiley.The.Shellcoders.Handbook.2nd.Edition.Aug.2007.rar

  • Downvote 1
Link to comment
Share on other sites

Dap aia e :D partea un pic de tot aiurea e ca eu am Slackware 13.1 pe x64 si cartea are cativa ani si e pe 32-bit si o umbra de 16-bit cred si na.... vmware in action din pacate, + ca daca apare si tehnologia 128-bit unde draq ma mai duc, dar cred ca ASM e relativ universal pe toate arhitecturile.... Nu sari pe mine daca zic prostii, nu m-am atins inca de ASM, zilele astea incep si eu sa ma iau de el ^-^

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...