Writing Security Tools and Exploits
暫譯: 撰寫安全工具與漏洞利用

James C. Foster, Vincent T. Liu

  • 出版商: Syngress Media
  • 出版日期: 2006-02-25
  • 售價: $2,210
  • 貴賓價: 9.5$2,100
  • 語言: 英文
  • 頁數: 650
  • 裝訂: Paperback
  • ISBN: 1597499978
  • ISBN-13: 9781597499972
  • 相關分類: 資訊安全
  • 已過版

買這商品的人也買了...

相關主題

商品描述

Description

 Learn to Write the Security Tools the Other Books Only Teach You to Use

Exploits. In information technology circles, the term exploits has become synonymous with vulnerabilities. It is a scary word that can keep you up at night wondering if you have purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and patched your entire environment. It’s also a topic that can enter the security water-cooler discussions faster than McAfee’s new wicked antivirus software or Symantec’s latest acquisition. Exploits are proof that the computer science or software programming community still does not have an understanding of how to design, create, and implement secure code.

 

· Write Solid Shellcode
Learn the techniques used to make the most out of vulnerabilities by employing the correct shellcode.

· Reverse Connection Shellcode
See how reverse connection shellcode makes a connection from a hacked system to a different system where it can be caught using network tools such as netcat.

· Buffer Overflow Exploits
Find techniques to protect against buffer overflows such as allocating buffers for string operations dynamically on the heap.

· Heap Overflows
Heap overflows have become the most prominent software security bugs. See how they can have varying exploitation techniques and consequences.

· Format Strings
Format string vulnerabilities occur when programmers pass externally supplied data to a printf function (or similar) as part of the format string argument.

· Race Conditions
Nearly all race condition exploits are written from a local attacker’s perspective and have the potential to escalate privileges, overwrite files, or compromise protected data.

· Exploitable Integer Bugs
See how integer bugs are harder for a researcher to spot than stack overflow vulnerabilities and learn why the implications of integer calculation errors are less understood by developers as a whole.

· Code for Nessus
Use NASLs to check for security vulnerabilities or misconfigurations.

· Metasploit Framework (MSF)
Use MSF and its components, msfweb, msfconsole, and msfcli, as an exploitation platform.

· Meterpreter Extensions
Use the power of the Meterpreter payload system to load custom-written DLLs into an exploited process’s address space.

 

 

 

商品描述(中文翻譯)

**描述**

學習撰寫其他書籍僅教你使用的安全工具

在資訊科技圈中,「漏洞」(exploits)這個術語已經成為「脆弱性」(vulnerabilities)的同義詞。這是一個令人恐懼的詞,可能會讓你夜不能寐,擔心自己是否購買了最佳的防火牆、正確配置了新的主機入侵防護系統,並且修補了整個環境。這也是一個話題,能比 McAfee 的新型惡意防毒軟體或 Symantec 的最新收購更快地進入安全水冷討論。漏洞證明了計算機科學或軟體程式設計社群仍然不理解如何設計、創建和實施安全的程式碼。

- 撰寫穩固的 Shellcode
學習使用正確的 shellcode 充分利用漏洞的技術。

- 反向連接 Shellcode
了解反向連接 shellcode 如何從被駭系統連接到另一個系統,並使用網路工具如 netcat 捕捉該連接。

- 緩衝區溢出漏洞
尋找保護緩衝區溢出的技術,例如在堆上動態分配字串操作的緩衝區。

- 堆溢出
堆溢出已成為最突出的軟體安全漏洞。了解它們如何具有不同的利用技術和後果。

- 格式字串
格式字串漏洞發生在程式設計師將外部提供的資料作為格式字串參數傳遞給 printf 函數(或類似函數)時。

- 競爭條件
幾乎所有的競爭條件漏洞都是從本地攻擊者的角度撰寫的,並且有潛力提升權限、覆蓋檔案或妨害受保護的資料。

- 可利用的整數錯誤
了解整數錯誤對研究人員來說比堆疊溢出漏洞更難以發現,並學習為什麼整數計算錯誤的影響對開發者來說較不易理解。

- Nessus 的程式碼
使用 NASLs 檢查安全漏洞或錯誤配置。

- Metasploit Framework (MSF)
使用 MSF 及其組件,如 msfweb、msfconsole 和 msfcli,作為利用平台。

- Meterpreter 擴展
利用 Meterpreter 負載系統的力量,將自訂編寫的 DLL 加載到被利用的進程的地址空間中。