书目

The Shellcoder's Handbook:Discovering and Exploiting Security Holes

内容简介

Thismuch–anticipatedrevision,writtenbytheultimategroupoftopsecurityexpertsintheworld,features40percentnewcontentonhowtofindsecurityholesinanyoperatingsystemorapplicationNewmaterialaddressesthemanynewexploitationtechniquesthathavebeendiscoveredsincethefirstedition,includingattacking"unbreakable"softwarepackagessuchasMcAfee′sEntercept,MacOSX,XP,Office2003,andVistaAlsofeaturesthefirst–everpublishedinformationonexploitingCisco′sIOS,withcontentthathasneverbeforebeenexploredThecompanionWebsitefeaturesdownloadablecodefiles

作者简介

ChrisAnleyisafounderanddirectorofNGSSoftware,asecuritysoftware,consultancy,andresearchcompanybasedinLondon,England.HeisactivelyinvolvedinvulnerabilityresearchandhasdiscoveredsecurityflawsinawidevarietyofplatformsincludingMicrosoftWindows,Oracle,SQLServer,IBMDB2,SybaseASE,MySQL,andPGP.JohnHeasmanistheDirectorofResearchatNGSSoftware.Heisaprolificsecurityresearcherandhaspublishedmanysecurityadvisoriesinenterpriselevelsoftware.HehasaparticularinterestinrootkitsandhasauthoredpapersonmalwarepersistenceviadevicefirmwareandtheBIOS.Heisalsoaco-authorofTheDatabaseHacker’sHandbook:DefendingDatabaseServers(Wiley2005).Felix“FX”LinderleadsSABRELabsGmbH,aBerlin-basedprofessionalconsultingcompanyspecializinginsecurityanalysis,systemdesigncreation,andverificationwork.Felixlooksbackat18yearsofprogrammingandoveradecadeofcomputersecurityconsultingforenterprise,carrier,andsoftwarevendorclients.Thisexperienceallowshimtorapidlydiveintocomplexsystemsandevaluatethemfromasecurityandrobustnesspointofview,eveninatypicalscenariosandonarcaneplatforms.Inhissparetime,FXworkswithhisfriendsfromthePhenoelithackinggroupondifferenttopics,whichhaveincludedCiscoIOS,SAP,HPprinters,andRIMBlackBerryinthepast.GerardoRichartehasbeendoingreverseengineeringandexploitdevelopmentformorethan15yearsnon-stop.Inthepast10yearshehelpedbuildthetechnicalarmofCoreSecurityTechnologies,whereheworkstoday.HiscurrentdutiesincludedevelopingexploitsforCoreIMPACT,researchingnewexploitationtechniquesandotherlow-levelsubjects,helpingotherexploitwriterswhenthingsgethairy,andteachinginternalandexternalclassesonassemblyandexploitwriting.Asresultofhisresearchandasahumblethankyoutothecommunity,hehaspublishedsometechnicalpapersandopensourceprojects,presentedinafewconferences,andreleasedpartofhistrainingmaterial.Hereallyenjoyssolvingtoughproblemsandreverseengineeringanypieceofcodethatfallsinhisreachjustforthefunofdoingit.

—  END  —