Code/Resource
Windows Develop
Linux-Unix program
Internet-Socket-Network
Web Server
Browser Client
Ftp Server
Ftp Client
Browser Plugins
Proxy Server
Email Server
Email Client
WEB Mail
Firewall-Security
Telnet Server
Telnet Client
ICQ-IM-Chat
Search Engine
Sniffer Package capture
Remote Control
xml-soap-webservice
P2P
WEB(ASP,PHP,...)
TCP/IP Stack
SNMP
Grid Computing
SilverLight
DNS
Cluster Service
Network Security
Communication-Mobile
Game Program
Editor
Multimedia program
Graph program
Compiler program
Compress-Decompress algrithms
Crypt_Decrypt algrithms
Mathimatics-Numerical algorithms
MultiLanguage
Disk/Storage
Java Develop
assembly language
Applications
Other systems
Database system
Embeded-SCM Develop
FlashMX/Flex
source in ebook
Delphi VCL
OS Develop
MiddleWare
MPI
MacOS develop
LabView
ELanguage
Software/Tools
E-Books
Artical/Document
Q-version Buffer Overflow Tutorial - Scene Tutorial
Upload User: mozhenmi
Upload Date: 2024-11-18
Package size: 11k
Downloads: 0
Category:
Proxy Server
Detail: Table of Contents | t/4
Preface | t/6
Author Introduction | t/6
Main Role Introduction | t/6
Reading Guide | t/6
Chapter 1, Introduction to Stack Overflow in Windows | t/8
1.1 Dream, Already Expanded | t/8
1.2 Beer and Cup - Buffer Overflow Principle | t/8
1.3 Mysterious Windows System | t/10
1.4 ShellCode Writing Introduction | t/17
1.5 Glimpse a Leopard Spot - Simple Utilization of Local Buffer Overflow | t/21
1.6 Summary - Taken from Xiaoqiang's Diary | t/28 |/n1.7 First Practical Experience - FoxMail Overflow Vulnerability Writing | t/29
1.8 Bullblade Trial - Printer Overflow Vulnerability Writing | t/41
1.9 JMP/ALL EBX - Another Overflow Exploiting Method | t/42
1.10 Step Up - IDA/IDQ Overflow Vulnerability Writing | t/55
After class Explanation | t/58
Chapter 2, Preliminary ShellCode Writing on Windows | t/60
2.1 What is ShellCode| T/60
2.2 Simple Example - Writing ShellCode for Console Windows | t/63
2.3 Preliminary Analysis of ShellCode Universality | t/78
2.4 Pop up Windows Dialogue Box ShellCode Writing | t/82
2.5 Add User ShellCode Writing | t/88
After class Explanation | t/98
Chapter 3, Backdoor Writing and ShellCode Extraction | t/100
3.1 Preparatory Knowledge | t/101
3.2 Backdoor Overall Ideas | t/121
3.3 Telnet High level language implementation of backdoor | t/125
3.4 generates ShellCode | t/136
3.5 further exploration | t/156
3.6 writing ShellCode for reverse backdoor | t/160
post class explanation | t/166
Chapter 4 programming for heap overflow exploitation in Windows | t/168
4.1 heap overflow exploration | t/168
4.2 RtlAllcoateHeap errors | t/170
4.3 instance - exploitation of Message heap overflow vulnerability | t/191
4.4 RtlFreeHeap errors | t/197
4.5 other ways of exploiting heap overflow | t/204
4.6 instance - JPEG processing of heap overflow vulnerability The use of | t/208
post class puzzle | t/215
Chapter 5 ShellCode deformation encoding method | t/217
5.1 Why encode | t/217
5.2 Simple encoding - XOR method | t/221
5.3 Simple deformation - fine-tuning method | t/231
5.4 Direct replacement method | t/233
5.5 Character splitting method | t/239
5.6 Memory search method |T/247
5.7 Search instance - exploitation of Serv-U vulnerability | t/249
5.8 "Computing with you" - Computing&Society | t/257
Post class troubleshooting | t/258
Chapter 6 Advanced Techniques for ShellCode Writing | t/260
6.1 Writing of Universal ShellCode | t/260
6.2 Efficient Extraction Techniques for ShellCode | t/285
6.3 Advanced Features of ShellCode | t/294
After class Explanation | t/305
Chapter 7, Vulnerability Discovery, Analysis, and Utilization | t/308
7.1 CCProxy Vulnerability Analysis | t/308
7.2 Black Box Method for Vulnerability Detection and Python Script | t/319
7.3 White Box Method and IDA Analysis Vulnerability | t/333
This package does not include any code with text format which can display in web page, please download the package.
-
- Firewall Technology Firewall Principles Firewall Principles Firewall Main Technologies Firewall Architecture ...
- A software that automatically searches for agentsSearch for free domestic proxy software on your own, it is particularly user-fri ...
- ISA 2006 series textbooksISA 2006 series textbooks, great materials, download now
- Proxy server verification source code proxy serverVC program source code that can verify the availability of proxy servers. Multi ...
- ProxyNet C # Multi threaded Proxy Service SearcherMulti threading is applied to search multiple URLs simultaneously, which can sea ...
- Nginx source code analysis - high-performance server developmentIn Internet programming, http server programming, as a very important direction, ...
- P2P video technology source codeP2P video technology source code - playback plugins (ChaosFilter and NetworkProx ...
- SSD8 EX1 WebProxyServer.javaWebProxyServer.java SSD8 EX1
- Detailed explanation of EXT core APIDetailed Explanation of EXT Core API 1, Ext Class 2, Array Class 4, Number Class ...
- Q-version Buffer Overflow Tutorial - Scene TutorialTable of Contents | t/4 Preface | t/6 Author Introduction | t/6 Main Role Int ...
-
- Easy2Game.Pro2.1.rarDeputy Easy2Game.Pro2.1 network tools
- proxy.zipA small http proxy
- ijb20.zipWWW proxy in windows, supporting socks4
- socks5.zipSock5 toolkit
- tcpproxy-1.1.4.tar.gztcp proxy server
- proxy_src.zip A simple port proxy procedure
- dante-1.1.1.tar.gzSocks proxy
- squid-2.2.devel3-src.tar.gzWidely used Ftp proxy
- http_proxy_src.zip A small http proxy
- smtpproxy-1.1.1.tar.gzSmtp proxy