安全检测软件软件：Symante Antivirus 企业版
病毒库日期：2005-10-26 rev .7
长驻 Razorback 2.0 7*24小时开机
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.
"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure
Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.
Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.
Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!
Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.
Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.
Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.
Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.
Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.
Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:
A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page
"From the Author" Forum where the authors post timely updates and links to related sites
The complete code listings from the book
Downloadable chapters from these best-selling books:
Buffer Overflow Attacks: Detect, Exploit, Prevent
Programmer's Ultimate Security DeskRef
Hacking the Code: ASP.NET Web Application Security
Nessus Network Auditing
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
- System Tools
Windows system variables
Scripting tool kit
Registry Patches Creator
Elevate permission application launcher
Dos Batch Programming Guide
CMD Basic Help
- Other Tools
Sysinternals process explorer
Scooter Beyond Compare
Rar 3.2 command Line
Evidence Mini HTML Browser
Advance Crc Utility
7 Zip 2.3
- DIZ, Info, Txt Tools
flyingcode NFO viewer
eminence NFO viewer
- Cracking Tools
IDA to SoftICE symbol loader
FCTR UFX GUI
Datarescue IDA PRO