Books & Videos

Table of Contents

  1. Chapter 0x100 INTRODUCTION

  2. Chapter 0x200 PROGRAMMING

    1. What Is Programming?

    2. Pseudo-code

    3. Control Structures

    4. More Fundamental Programming Concepts

    5. Getting Your Hands Dirty

    6. Back to Basics

    7. Memory Segmentation

    8. Building on Basics

  3. Chapter 0x300 EXPLOITATION

    1. Generalized Exploit Techniques

    2. Buffer Overflows

    3. Experimenting with BASH

    4. Overflows in Other Segments

    5. Format Strings

  4. Chapter 0x400 NETWORKING

    1. OSI Model

    2. Sockets

    3. Peeling Back the Lower Layers

    4. Network Sniffing

    5. Denial of Service

    6. TCP/IP Hijacking

    7. Port Scanning

    8. Reach Out and Hack Someone

  5. Chapter 0x500 SHELLCODE

    1. Assembly vs. C

    2. The Path to Shellcode

    3. Shell-Spawning Shellcode

    4. Port-Binding Shellcode

    5. Connect-Back Shellcode

  6. Chapter 0x600 COUNTERMEASURES

    1. Countermeasures That Detect

    2. System Daemons

    3. Tools of the Trade

    4. Log Files

    5. Overlooking the Obvious

    6. Advanced Camouflage

    7. The Whole Infrastructure

    8. Payload Smuggling

    9. Buffer Restrictions

    10. Hardening Countermeasures

    11. Nonexecutable Stack

    12. Randomized Stack Space

  7. Chapter 0x700 CRYPTOLOGY

    1. Information Theory

    2. Algorithmic Run Time

    3. Symmetric Encryption

    4. Asymmetric Encryption

    5. Hybrid Ciphers

    6. Password Cracking

    7. Wireless 802.11b Encryption

    8. WEP Attacks

  8. Chapter 0x800 CONCLUSION

    1. References

    2. Sources

  1. COLOPHON