<--- Back to Details
First PageDocument Content
Shellcode / Instruction set architectures / Metasploit Project / X86 / Computer security / Cyberwarfare / Computer architecture
Date: 2010-11-01 16:47:09
Shellcode
Instruction set architectures
Metasploit Project
X86
Computer security
Cyberwarfare
Computer architecture

Microsoft PowerPoint - Shmoocon2008.pptx

Add to Reading List

Source URL: www.shmoocon.org

Download Document from Source Website

File Size: 689,03 KB

Share Document on Facebook

Similar Documents

Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

DocID: 1qjK6 - View Document

Software / Computer security / Computing / Computer network security / Software testing / Metasploit Project / Open core / H. D. Moore

Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed by

DocID: 1pX1w - View Document

Software / Computer security / Computing / Computer network security / Software testing / Metasploit Project / Open core / H. D. Moore

Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed by

DocID: 1pRQd - View Document

Programming language implementation / Executable / Disassembler / Linker / Relocation / Compiler / Machine code / Metasploit Project

Metasm a ruby (dis)assembler Yoann Guillot 20 october 2007

DocID: 1pBUY - View Document

Computer security / Security / Cyberwarfare / Cybercrime / Computer network security / National security / Hacking / Military technology / Shellcode / Metasploit Project / Security hacker

William Owen Redwood Contact Information Department of Computer Science The Florida State University

DocID: 1npkL - View Document