Related Books

A Guide to Kernel Exploitation
Language: en
Pages: 466
Authors: Enrico Perla
Categories: Computers
Type: BOOK - Published: 2010-10-28 - Publisher: Elsevier

DOWNLOAD EBOOK

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exp
Privilege Escalation Techniques
Language: en
Pages: 340
Authors: Alexis Ahmed
Categories: Computers
Type: BOOK - Published: 2021-11-25 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key FeaturesDiscover a range of t
Rootkits
Language: en
Pages: 354
Authors: Greg Hoglund
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Buffer Overflow Attacks
Language: en
Pages: 521
Authors: Jason Deckard
Categories: Computers
Type: BOOK - Published: 2005-01-29 - Publisher: Elsevier

DOWNLOAD EBOOK

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer
The Shellcoder's Handbook
Language: en
Pages: 758
Authors: Chris Anley
Categories: Computers
Type: BOOK - Published: 2011-02-16 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security hole