Bạn ghé thăm diễn đàn lần đầu? hãy đăng ký ngay bây giờ để tham gia.
  • Đăng nhập:

Chào mừng bạn đến với ITVNN FORUM - Diễn đàn công nghệ thông tin.

Nếu đây là lần đầu tiên bạn tham gia diễn đàn, xin mời bạn xem phần Hỏi/Ðáp để biết cách dùng diễn đàn. Để có thể tham gia thảo luận bạn phải đăng ký làm thành viên, click vào đây để đăng ký.


  • Partner Area
    • ITVNN HOSTING - Thiết kế website, Cung cấp Domain, Hosting, VPS Việt Nam Anh Hùng - Thông tin truyền thông
kết quả từ 1 tới 1 trên 1
Tăng kích thước phông chữ Giảm kích thước phông chữ
  1. #1
    MrZen's Avatar

    Trạng thái
    Offline
    Tham gia ngày
    Sep 2009
    Thành viên thứ
    437
    Giới tính
    Bài gởi
    78
    Level: 32 [?]
    Experience: 415,634
    Next Level: 453,790
    Cảm ơn 1
    Cảm ơn 1 lần / 1 Bài viết

    Default Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding  

    The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

    1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

    2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets are implemented differently in nearly ever language.

    3. Shellcode - Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.

    4. Porting - Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not "recreate the wheel."

    5. Coding Tools - The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.

    *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.

    *Perform zero-day exploit forensics by reverse engineering malicious code.

    *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.
    DOWNLOAD HERE


 

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Trả lời: 0
    Bài mới gởi: 30-12-2015, 02:48 PM
  2. Patched Flash Uploader to Fix Known Exploits
    By admin in forum v4.x Modifications
    Trả lời: 0
    Bài mới gởi: 23-01-2014, 06:18 PM
  3. share source reverse-ip, check ip cực nhanh
    By pepum in forum Lập trình web
    Trả lời: 5
    Bài mới gởi: 24-10-2011, 06:46 PM
  4. Tool Get key KAV KIS
    By phongdatgl in forum Security - Antivirus
    Trả lời: 2
    Bài mới gởi: 15-06-2011, 09:02 PM
  5. Writing Security Tools and Exploits
    By MrZen in forum E-books
    Trả lời: 2
    Bài mới gởi: 16-09-2009, 07:58 PM

Tags for this Thread

Bookmarks

Quuyền Hạn Của Bạn

  • Bạn không thể tạo chủ đề mới
  • Bạn không thể trả lời bài viết
  • Bạn không thể gửi file đính kèm
  • Bạn không thể chỉnh sửa bài viết
  •