Buffer overflow attacks : detect, exploit, prevent

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This i...

Celý popis

Uložené v:
Podrobná bibliografia
Hlavný autor: Foster, James C.
Médium: E-kniha Kniha
Jazyk:English
Vydavateľské údaje: Rockland, Mass Syngress 2005
Elsevier Science & Technology Books
Syngress Pub
Vydanie:1
Predmet:
ISBN:9781932266672, 1932266674
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. *Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows. *None of the current-best selling software security books focus exclusively on buffer overflows. *This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
AbstractList The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer. *Over half of the "SANS TOP 10 Software Vulnerabilities" are related to buffer overflows. *None of the current-best selling software security books focus exclusively on buffer overflows. *This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.
Author Foster, James C.
Author_xml – sequence: 1
  fullname: Foster, James C.
BackLink https://cir.nii.ac.jp/crid/1130282271435927680$$DView record in CiNii
BookMark eNpVkNtKAzEQhiMesNa-wyIiCG5NJsf1zpZ6gII3It4t2TTBdUNTN9vWxzftCuJczIH_42dmztDRMiwtQhcEjwkm4nZSSJWTvKAAQuRC5jB-55iSHA7QKGkYK8yUYsAO9zPpSSHhBA2SXFBOAE7RKMZPvAtJlYABgsnaOdtmYWNb58M2012nTROzu2xhO2u6m8x-r3yoU7Nq7cYuu3N07LSPdvRbh-jtYfY6fcrnL4_P0_t5rqXiBcnlQhvLLCbO0oVh3FjFsYPKAGcYDK8KnFaokowpMKGoK4ByMM5gRcFpOkRXvXFsau9jcF1ZhdBEYN-yrJq4O4MJLhN43YM6NnYbP4LvYrnxdk-X_77zZ7pqw9faxq7cYyYd1mpfziZTAFCYJvCyB5d1XZp6lwmhGBSAJIzyAqRI3A9vfHNB
ContentType eBook
Book
DBID RYH
DEWEY 005.84
DOI 10.1016/B978-1-932266-67-2.X5031-2
DatabaseName CiNii Complete
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9780080488424
0080488420
Edition 1
ExternalDocumentID bks00004657
9780080488424
EBC222803
BA77489461
Genre Case studies
Electronic books
GroupedDBID -KG
-VX
089
2.1
20A
38.
8JS
A4I
A4J
AAAAS
AABBV
AALIM
AALRI
AAORS
AAXUO
AAYWO
AAZNM
ABARN
ABGWT
ABIAV
ABLXK
ABMAC
ABMRC
ABQPQ
ABQQC
ABSZC
ACHHS
ACLGV
ACNAM
ACXMD
ADCEY
ADVEM
AEONB
AERYV
AFOJC
AGAMA
AHFFV
AHPGB
AHWGJ
AIJWT
AIXPE
AJFER
AKHYG
ALMA_UNASSIGNED_HOLDINGS
ALTAS
AMYDA
ASPBG
AVWKF
AVWMD
AZFZN
AZZ
BBABE
BPBUR
CETPU
CZZ
DUGUG
EBSCA
ECOWB
FEDTE
GABKF
GEOUK
HF4
HGY
HVGLF
INJ
IOW
JJU
JNA
JXC
KAH
MYL
NK1
NK2
P-J
PQQKQ
PS.
Q.B
RYH
SDK
SRW
UO7
WZT
XI1
6XM
AADAM
AJLYV
DRU
IVK
IWL
BFMIH
PLCCB
PQEST
PQUKI
P~0
YSPEL
ID FETCH-LOGICAL-a78591-7dace4e01fe3dc45ce850f2bc25402c5b90862b1fe0324683f92352cfc0832fa3
ISBN 9781932266672
1932266674
IngestDate Fri Sep 23 13:48:05 EDT 2022
Thu Feb 27 10:12:44 EST 2025
Wed Nov 26 06:51:15 EST 2025
Thu Jun 26 22:55:34 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCallNum QA76.9.A25 B84 2005b
LCCallNum_Ident QA76.9.A25 F67 2005
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a78591-7dace4e01fe3dc45ce850f2bc25402c5b90862b1fe0324683f92352cfc0832fa3
Notes Includes index
Available also in a print ed.
Mode of access: Internet via World Wide Web.
Title from title screen.
OCLC 780935122
PQID EBC222803
PageCount 521
ParticipantIDs skillsoft_books24x7_bks00004657
askewsholts_vlebooks_9780080488424
proquest_ebookcentral_EBC222803
nii_cinii_1130282271435927680
PublicationCentury 2000
PublicationDate c2005
2005
2005-01-29
PublicationDateYYYYMMDD 2005-01-01
2005-01-29
PublicationDate_xml – year: 2005
  text: c2005
PublicationDecade 2000
PublicationPlace Rockland, Mass
PublicationPlace_xml – name: Rockland, Mass
– name: Chantilly
PublicationYear 2005
Publisher Syngress
Elsevier Science & Technology Books
Syngress Pub
Publisher_xml – name: Syngress
– name: Elsevier Science & Technology Books
– name: Syngress Pub
SSID ssj0000073862
Score 1.8371657
Snippet The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer...
SourceID skillsoft
askewsholts
proquest
nii
SourceType Aggregation Database
Publisher
SubjectTerms Buffer storage (Computer science)
Computer networks
Computer security
Computer viruses
Security measures
SubjectTermsDisplay Buffer storage (Computer science)
Computer security -- Case studies.
Computer security.
Electronic books.
TableOfContents Cover -- Contents -- Foreword -- Chapter 1 Buffer Overflows: The Essentials -- Chapter 2 Understanding Shellcode -- Chapter 3 Writing Shellcode -- Chapter 4 Win32 Assembly -- Chapter 5 Stack Overflows -- Section 1 Case Studies Case Study 1.1 FreeBSD NN Exploit Code -- Chapter 6 Heap Corruption -- Chapter 7 Format String Attacks -- Chapter 8 Windows Buffer Overflows -- Section 2 Case Studies Case Study 2.1 cURL Buffer Overflow on Linux -- Chapter 9 Finding Buffer Overflows in Source -- Section 3 Case Studies Case Study 3.1 InlineEgg I -- Appendix A The Complete Data Conversion Table -- Appendix B Useful Syscalls -- Index
Title Buffer overflow attacks : detect, exploit, prevent
URI https://cir.nii.ac.jp/crid/1130282271435927680
https://ebookcentral.proquest.com/lib/[SITE_ID]/detail.action?docID=222803
https://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9780080488424&uid=none
http://www.books24x7.com/marc.asp?bookid=9403
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwED9BhwR7YQOmlTGIEG9dhuPY-eCNVgUkpA2JgfoWOa6DolbZtGSj_Pe7c5ysHUKIB16sNEnr6n7J3f3s-wB4g4whDTSnsqE68oVWwk_mgiFVCdFaK40WPbHNJuKTk2Q2S7-4loa1bScQV1WyWqUX_xVqPIdgU-rsP8Dd_yiewGMEHUeEHcc7HnH_0e3JXlGvkxHFZBbL858j1TSUQG9J_9zQZgHJ01DQXWkPL9ryTbeGqOvSYUNnR5PjjSUBeWdJ4Ouv6sda_EZLFclRQ2MctY1yflOcLYcft5yyvdVHFcqPZxJfe5ehuFmYevw-ptI1gsjnfWQtA9j6OD399rlf4qJdQCRMlE7XTS5cla3-z3R1YIPo7Z8n34ZtVS9Q6aNBaGr0Aqqy3GAED-tFuVzWaLjWnIOzHRhQwsgu3DPVE3jctcnwnNZ8CrwFxuuA8Rww3juvheXIc6AceQ6SZ_D9w_Rs8sl3rSp8FVMFQD-eK22EYUFhwrkWkrrBsoLnGgk441rmKXHHHC8zdGGjJCzQs5ZcFxp9YF6ocA8G1Xll9sHLOdMJS4SQRglT6JwV6AgHJg1TxWIuh_B6TRrZ9dJuq9cZ1ZJC_x81suBiCIcopEyXNAa0O42eIPW6lylHrNgQXnXiy-z3XSxwNh1PaFGQhXhHL9XMzsDFKs7yha08JiIZP__LHAfw6PbpfAGD5vLKHMIDfd2U9eVL97TcAF9CN_s
linkProvider ProQuest Ebooks
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.title=Buffer+overflow+attacks+%3A+detect%2C+exploit%2C+prevent&rft.au=Foster%2C+James+C.&rft.date=2005-01-01&rft.pub=Syngress&rft.isbn=9781932266672&rft_id=info:doi/10.1016%2FB978-1-932266-67-2.X5031-2&rft.externalDocID=BA77489461
thumbnail_m http://cvtisr.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Fvle.dmmserver.com%2Fmedia%2F640%2F97800804%2F9780080488424.jpg