文档介绍:• Table of Contents
• Index
Exploiting Software How to Break Code
ByGreg Hoglund, Gary McGraw
Publisher: Addison Wesley
Pub Date: February 17, 2004
ISBN: 0-201-78695-8
Pages: 512
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and
techniques used by bad guys to break software. If you want to protect your software from
attack, you must first learn how real attacks are really carried out.
This must-have book may shock you—and it will certainly educate beyond the
script kiddie treatment found in many hacking books, you will learn about
Why software exploit will continue to be a serious problem
work security mechanisms do not work
Attack patterns
Reverse engineering
Classic attacks against server software
Surprising attacks against client software
Techniques for crafting malicious input
The technical details of buffer overflows
Rootkits
Exploiting Software is filled with the tools, concepts, and knowledge necessary to break
software.
• Table of Contents
• Index
Exploiting Software How to Break Code
ByGreg Hoglund, Gary McGraw
Publisher: Addison Wesley
Pub Date: February 17, 2004
ISBN: 0-201-78695-8
Pages: 512
Copyright
How doesPraise softwarefor Exploiting break? Software How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
Attack Patterns
What tools can be used to break software? This book provides the answers.
Foreword
Exploiting Preface Software is loaded with examples of real attacks, attack patterns, tools, and
techniques What usedThis Book by Isbad About guys to break software. If you want to protect yo