Hacking - The Art of Exploitation, 2nd Edition
Cryptology 447 19 2 | 51 0 | 83 0 | 115 0 | 147 1 | 179 0 | 211 1 | 243 0 | 20 3 | 52 0 | 84 3 | 116 1 | 148 2 | 180 2 | 212 2 | ...
448 0x700 9 0 | 41 1 | 73 0 | 105 0 | 137 1 | 169 1 | 201 1 | 233 1 | 10 2 | 42 2 | 74 0 | 106 4 | 138 2 | 170 0 | 202 1 | 234 0 ...
Cryptology 449 AIRCRACK-NG(1) AIRCRACK-NG(1) NAME aircrack-ng is a 802.11 WEP / WPA-PSK key cracker. SYNOPSIS aircrack-ng [optio ...
...
0x800 CONCLUSION Hacking tends to be a misunderstood topic, and the media likes to sensationalize, which only exacerbates this c ...
452 0x800 don’t have malicious intent; instead, they help vendors fix their vulnerable software. Without hackers, the vulnerabil ...
Conclusion 453 CNET News. “40-Bit Crypto Proves No Problem.” Online publication at http://www.news.com/News/Item/0,4,7483,00.htm ...
454 0x800 0x820 Sources pcalc A programmer’s calculator available from Peter Glen http://ibiblio.org/pub/Linux/apps/math/calc/pc ...
INDEX Symbols & Numbers & (ampersand) for address-of operator, 45 for background process, 347 < > (angle brackets), for ...
456 INDEX ARP. See Address Resolution Protocol (ARP) arp_cmdline() function, 246 ARPhdr structure, 245–246 arp_initdata() functi ...
INDEX 457 buffer overrun, 119 buffers, 38 program restrictions on, 363–376 buildarp() function, 246 byte, 21 byte counter, incre ...
458 INDEX crash, 61, 128 from buffer overflow, 120 and client_addr_ptr, 353 by DoS attacks, 251 from out-of-bound memory address ...
INDEX 459 dtors_sample.c program, 184 dump() function, 204 dup2 system call, 307 DWORD (double word), 29 converting to quadword, ...
460 INDEX exploitation, continued format strings, continued with short writes, 182–183 vulnerability, 170–171 writing to arbitra ...
INDEX 461 declaring as void, 17 for error checking, 80–81 libraries of, 19 local variables for, 62 memory, string pointer refere ...
462 INDEX hardware addresses, 218 hash lookup table, 423–424 head command, 143–144 HEAD command (HTTP), 208 heap, 70 allocation ...
INDEX 463 Internet Protocol (IP), 220 addresses, 197, 220 conversion, 203 data-link layer and, 218–219 in logs, 348 redirection, ...
464 INDEX LiveCD, 4, 19 John the Ripper, 422 Nemesis, 242 /usr/src/mitm-ssh, 407 Load Effective Address instruction (lea), 35, 2 ...
INDEX 465 nemesis_arp() function, 245 nemesis-arp.c file, 244–245 nemesis.h file, 245–246 nemesis-proto_arp.c file, 246–248 nest ...
466 INDEX O O_APPEND access mode, 84 objdump program, 21, 184, 185 O_CREAT access mode, 84, 87 off-by-one error, 116–117 one-tim ...
«
16
17
18
19
20
21
22
23
24
25
»
Free download pdf