Hacking: The Art of Exploitation Second Edition

Results: 7



#Item
1Shellcode / Cisco IOS / Rootkit / Denial-of-service attack / Router / Cisco Systems / IOS / Transmission Control Protocol / Hacking: The Art of Exploitation Second Edition / Computing / Cyberwarfare / Computer security

Killing the Myth of Cisco IOS Diversity∗ : Recent Advances in Reliable Shellcode Design Ang Cui Jatin Kataria

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
2Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-06-18 08:37:26
3Data security / Email / Password / Hacker / Social engineering / Internet privacy / Information security / Hacking: The Art of Exploitation Second Edition / Password policy / Computing / Hacking / Computer security

COMPUTER SECURITY 261 SOCIAL HACKING (ALSO KNOWN AS SOCIAL ENGINEERING)

Add to Reading List

Source URL: www.privacytactics.com

Language: English - Date: 2012-08-13 12:49:14
4Shellcode / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Software / Computing / Cyberwarfare

Shellzer: a tool for the dynamic analysis of malicious shellcode Yanick Fratantonio1 , Christopher Kruegel2 , and Giovanni Vigna2 1 Politecnico di Milano, Italy [removed]

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2013-07-29 17:43:47
5Procedural programming languages / Source code / C programming language / C++ / Programming language implementation / C / Header file / Literate programming / Hacking: The Art of Exploitation Second Edition / Computing / Computer programming / Software

Part 1: Jumping into C++ ...................................................................................................................................................... 2 Chapter 1: Chapter 2:

Add to Reading List

Source URL: www.cprogramming.com

Language: English - Date: 2012-12-10 11:35:10
6Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2009-10-28 10:35:48
7Software bugs / Shellcode / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Computer security / Computing / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2010-07-13 13:39:02
UPDATE