Buffer overflow attacks : detect, exploit, prevent
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This i...
Uložené v:
| Hlavný autor: | |
|---|---|
| Médium: | E-kniha Kniha |
| Jazyk: | English |
| Vydavateľské údaje: |
Rockland, Mass
Syngress
2005
Elsevier Science & Technology Books Syngress Pub |
| Vydanie: | 1 |
| Predmet: | |
| ISBN: | 9781932266672, 1932266674 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows. *None of the current-best selling software security books focus exclusively on buffer overflows. *This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. |
|---|---|
| AbstractList | The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
*Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows. *None of the current-best selling software security books focus exclusively on buffer overflows. *This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. |
| Author | Foster, James C. |
| Author_xml | – sequence: 1 fullname: Foster, James C. |
| BackLink | https://cir.nii.ac.jp/crid/1130282271435927680$$DView record in CiNii |
| BookMark | eNpVkNtKAzEQhiMesNa-wyIiCG5NJsf1zpZ6gII3It4t2TTBdUNTN9vWxzftCuJczIH_42dmztDRMiwtQhcEjwkm4nZSSJWTvKAAQuRC5jB-55iSHA7QKGkYK8yUYsAO9zPpSSHhBA2SXFBOAE7RKMZPvAtJlYABgsnaOdtmYWNb58M2012nTROzu2xhO2u6m8x-r3yoU7Nq7cYuu3N07LSPdvRbh-jtYfY6fcrnL4_P0_t5rqXiBcnlQhvLLCbO0oVh3FjFsYPKAGcYDK8KnFaokowpMKGoK4ByMM5gRcFpOkRXvXFsau9jcF1ZhdBEYN-yrJq4O4MJLhN43YM6NnYbP4LvYrnxdk-X_77zZ7pqw9faxq7cYyYd1mpfziZTAFCYJvCyB5d1XZp6lwmhGBSAJIzyAqRI3A9vfHNB |
| ContentType | eBook Book |
| DBID | RYH |
| DEWEY | 005.84 |
| DOI | 10.1016/B978-1-932266-67-2.X5031-2 |
| DatabaseName | CiNii Complete |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISBN | 9780080488424 0080488420 |
| Edition | 1 |
| ExternalDocumentID | bks00004657 9780080488424 EBC222803 BA77489461 |
| Genre | Case studies Electronic books |
| GroupedDBID | -KG -VX 089 2.1 20A 38. 8JS A4I A4J AAAAS AABBV AALIM AALRI AAORS AAXUO AAYWO AAZNM ABARN ABGWT ABIAV ABLXK ABMAC ABMRC ABQPQ ABQQC ABSZC ACHHS ACLGV ACNAM ACXMD ADCEY ADVEM AEONB AERYV AFOJC AGAMA AHFFV AHPGB AHWGJ AIJWT AIXPE AJFER AKHYG ALMA_UNASSIGNED_HOLDINGS ALTAS AMYDA ASPBG AVWKF AVWMD AZFZN AZZ BBABE BPBUR CETPU CZZ DUGUG EBSCA ECOWB FEDTE GABKF GEOUK HF4 HGY HVGLF INJ IOW JJU JNA JXC KAH MYL NK1 NK2 P-J PQQKQ PS. Q.B RYH SDK SRW UO7 WZT XI1 6XM AADAM AJLYV DRU IVK IWL BFMIH PLCCB PQEST PQUKI P~0 YSPEL |
| ID | FETCH-LOGICAL-a78591-7dace4e01fe3dc45ce850f2bc25402c5b90862b1fe0324683f92352cfc0832fa3 |
| ISBN | 9781932266672 1932266674 |
| IngestDate | Fri Sep 23 13:48:05 EDT 2022 Thu Feb 27 10:12:44 EST 2025 Wed Nov 26 06:51:15 EST 2025 Thu Jun 26 22:55:34 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCallNum | QA76.9.A25 B84 2005b |
| LCCallNum_Ident | QA76.9.A25 F67 2005 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-a78591-7dace4e01fe3dc45ce850f2bc25402c5b90862b1fe0324683f92352cfc0832fa3 |
| Notes | Includes index Available also in a print ed. Mode of access: Internet via World Wide Web. Title from title screen. |
| OCLC | 780935122 |
| PQID | EBC222803 |
| PageCount | 521 |
| ParticipantIDs | skillsoft_books24x7_bks00004657 askewsholts_vlebooks_9780080488424 proquest_ebookcentral_EBC222803 nii_cinii_1130282271435927680 |
| PublicationCentury | 2000 |
| PublicationDate | c2005 2005 2005-01-29 |
| PublicationDateYYYYMMDD | 2005-01-01 2005-01-29 |
| PublicationDate_xml | – year: 2005 text: c2005 |
| PublicationDecade | 2000 |
| PublicationPlace | Rockland, Mass |
| PublicationPlace_xml | – name: Rockland, Mass – name: Chantilly |
| PublicationYear | 2005 |
| Publisher | Syngress Elsevier Science & Technology Books Syngress Pub |
| Publisher_xml | – name: Syngress – name: Elsevier Science & Technology Books – name: Syngress Pub |
| SSID | ssj0000073862 |
| Score | 1.8371657 |
| Snippet | The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer... |
| SourceID | skillsoft askewsholts proquest nii |
| SourceType | Aggregation Database Publisher |
| SubjectTerms | Buffer storage (Computer science) Computer networks Computer security Computer viruses Security measures |
| SubjectTermsDisplay | Buffer storage (Computer science) Computer security -- Case studies. Computer security. Electronic books. |
| TableOfContents | Cover -- Contents -- Foreword -- Chapter 1 Buffer Overflows: The Essentials -- Chapter 2 Understanding Shellcode -- Chapter 3 Writing Shellcode -- Chapter 4 Win32 Assembly -- Chapter 5 Stack Overflows -- Section 1 Case Studies Case Study 1.1 FreeBSD NN Exploit Code -- Chapter 6 Heap Corruption -- Chapter 7 Format String Attacks -- Chapter 8 Windows Buffer Overflows -- Section 2 Case Studies Case Study 2.1 cURL Buffer Overflow on Linux -- Chapter 9 Finding Buffer Overflows in Source -- Section 3 Case Studies Case Study 3.1 InlineEgg I -- Appendix A The Complete Data Conversion Table -- Appendix B Useful Syscalls -- Index |
| Title | Buffer overflow attacks : detect, exploit, prevent |
| URI | https://cir.nii.ac.jp/crid/1130282271435927680 https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=222803 https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780080488424&uid=none http://www.books24x7.com/marc.asp?bookid=9403 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwED9BhwR7YQOmlTGIEG9dhuPY-eCNVgUkpA2JgfoWOa6DolbZtGSj_Pe7c5ysHUKIB16sNEnr6n7J3f3s-wB4g4whDTSnsqE68oVWwk_mgiFVCdFaK40WPbHNJuKTk2Q2S7-4loa1bScQV1WyWqUX_xVqPIdgU-rsP8Dd_yiewGMEHUeEHcc7HnH_0e3JXlGvkxHFZBbL858j1TSUQG9J_9zQZgHJ01DQXWkPL9ryTbeGqOvSYUNnR5PjjSUBeWdJ4Ouv6sda_EZLFclRQ2MctY1yflOcLYcft5yyvdVHFcqPZxJfe5ehuFmYevw-ptI1gsjnfWQtA9j6OD399rlf4qJdQCRMlE7XTS5cla3-z3R1YIPo7Z8n34ZtVS9Q6aNBaGr0Aqqy3GAED-tFuVzWaLjWnIOzHRhQwsgu3DPVE3jctcnwnNZ8CrwFxuuA8Rww3juvheXIc6AceQ6SZ_D9w_Rs8sl3rSp8FVMFQD-eK22EYUFhwrkWkrrBsoLnGgk441rmKXHHHC8zdGGjJCzQs5ZcFxp9YF6ocA8G1Xll9sHLOdMJS4SQRglT6JwV6AgHJg1TxWIuh_B6TRrZ9dJuq9cZ1ZJC_x81suBiCIcopEyXNAa0O42eIPW6lylHrNgQXnXiy-z3XSxwNh1PaFGQhXhHL9XMzsDFKs7yha08JiIZP__LHAfw6PbpfAGD5vLKHMIDfd2U9eVL97TcAF9CN_s |
| linkProvider | ProQuest Ebooks |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Buffer+overflow+attacks+%3A+detect%2C+exploit%2C+prevent&rft.au=Foster%2C+James+C.&rft.date=2005-01-01&rft.pub=Syngress&rft.isbn=9781932266672&rft_id=info:doi/10.1016%2FB978-1-932266-67-2.X5031-2&rft.externalDocID=BA77489461 |
| thumbnail_m | http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97800804%2F9780080488424.jpg |

