Buffer Overflow Attacks
暫譯: 緩衝區溢位攻擊

James C. Foster, Vitaly Osipov, Nish Bhalla

  • 出版商: Syngress Media
  • 出版日期: 2005-02-21
  • 定價: $1,360
  • 售價: 5.0$680
  • 語言: 英文
  • 頁數: 512
  • 裝訂: Paperback
  • ISBN: 1932266674
  • ISBN-13: 9781932266672
  • 相關分類: Web-crawler 網路爬蟲資訊安全
  • 立即出貨(限量) (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Description:

Will the Code You Write Today, Headline Tomorrow’s BugTraq Mail List?
Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker’s “vulnerability of choice.” These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of “custom exploits.”

These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster.


James C. Foster’s Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel’s Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks. In Buffer Overflow Attacks, you will see:

Includes Numbered-by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows, Heap Corruption, and Format String Bugs
Provides Case Studies for Most Major Platforms and Environments, Including Windows, FreeBSD, FrontPage, and Linux,
Avoid Worm or Custom Exploits by Analyzing Your Source Code to Detect Buffer Overflow Vulnerabilities
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.

Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.

A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

商品描述(中文翻譯)

**描述:**
您今天寫的程式碼,會成為明天 BugTraq 郵件列表的頭條嗎?對於臭名昭著的網路攻擊進行的取證調查,例如 SQL Slammer 和 Blaster Worms,顯示出緩衝區溢出是高級駭客的「首選漏洞」。這些蠕蟲癱瘓了網際網路,清理成本高達數十億美元。現在,更強大且隱蔽的威脅以「自訂利用」的形式出現。

這些一次性利用是專門為攻擊您的企業而精心製作的,使其更難以檢測和防禦。沒有引人注目的名稱,沒有媒體報導;只有您自己的個人災難。

James C. Foster 的《緩衝區溢出攻擊》清楚地表明,防禦各種緩衝區溢出攻擊的唯一方法是為所有應用程式實施全面的設計、編碼和測試計劃。從 Dave Aitel 的前言到最後的附錄,這是唯一一本專門致力於檢測、利用和防止緩衝區溢出攻擊的書籍。在《緩衝區溢出攻擊》中,您將看到:

包括逐行編號的利用程式碼範例,說明堆疊溢出、堆損壞和格式字串錯誤之間的差異
提供大多數主要平台和環境的案例研究,包括 Windows、FreeBSD、FrontPage 和 Linux
通過分析您的源代碼來檢測緩衝區溢出漏洞,以避免蠕蟲或自訂利用
SANS Institute 維護著「十大軟體漏洞」的列表。目前,這些漏洞中有超過一半可以被緩衝區溢出攻擊利用,使這類攻擊成為惡意攻擊者使用的最常見和最危險的武器之一。這是第一本專門針對檢測、利用和防止最常見和危險攻擊的書籍。

幾乎所有最近幾年對網際網路造成最嚴重的電腦攻擊,包括 SQL Slammer、Blaster 和 I Love You 攻擊。如果執行得當,溢出漏洞將允許攻擊者以被溢出的進程的等效權限在受害者的機器上運行任意代碼。這通常用於提供對受害者機器的遠端 Shell,進而進行進一步的利用。

緩衝區溢出是一種在某些程式語言中存在的意外行為。本書提供了具體的、真實的代碼範例,從駭客的角度探討如何利用緩衝區溢出攻擊,以及如何為軟體開發者防禦這些攻擊。