Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.
"synopsis" may belong to another edition of this title.
Ivan Sklyarov writes the "X-Puzzles" column in Hacker magazine and is the author of Puzzles of Hackers.
"About this title" may belong to another edition of this title.
US$ 33.28 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: dsmbooks, Liverpool, United Kingdom
paperback. Condition: Very Good. Very Good. book. Seller Inventory # D8S0-3-M-1931769613-4
Quantity: 1 available