您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. Smashing The Stack For Fun And Profit

  2. 缓冲区溢出的经典之作。 Introduction Over the last few months there has been a large increase of buffer overflow vulnerabilities being both discovered and exploited. Examples of these are syslog, splitvt, sendmail 8.7.5, Linux/FreeBSD mount, Xt library, at, etc
  3. 所属分类:C

    • 发布日期:2009-10-07
    • 文件大小:408576
    • 提供者:scalps
  1. apache security 安全

  2. Preface Audience Scope Contents of This Book Online Companion Conventions Used in This Book Using Code Examples We'd Like to Hear from You Safari Enabled Acknowledgments C hapter 1. Apache Security Principles Section 1.1. Security Definitions Sectio
  3. 所属分类:Web开发

    • 发布日期:2009-10-12
    • 文件大小:1048576
    • 提供者:wwfwolf
  1. A Buffer Overflow Study Attacks and Defenses

  2. Introduction On november 2, 1988 a new form of threat appeared with the Morris Worm, also known as the Internet Worm. This famous event caused heavy damages on the internet, by using two common unix programs, sendmail and fingerd. This was possible
  3. 所属分类:Oracle

    • 发布日期:2009-10-13
    • 文件大小:496640
    • 提供者:zhoujq
  1. Buffer Overflow Attacks Detect, Exploit, Prevent(syngress安全图书)

  2. The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous w
  3. 所属分类:其它

    • 发布日期:2010-02-14
    • 文件大小:5242880
    • 提供者:sunxianbin
  1. C++ Hackers Guide

  2. Table of Contents Real World Hacks................................................................................................9 Hack 1: Make Code Disappear..........................................................................10 Hack 2: Let S
  3. 所属分类:C++

    • 发布日期:2010-03-15
    • 文件大小:2097152
    • 提供者:zltension1
  1. Developer’s Guide to Web Application Security(syngress安全图书)

  2. Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vu
  3. 所属分类:Web开发

    • 发布日期:2010-04-05
    • 文件大小:10485760
    • 提供者:sunxianbin
  1. Apress.Coders.at.Work.Sep.2009_www_softarchive_net.rar

  2. No more, of course. Now the world is awash in programmers. According to the Bureau of Labor Statistics, in the United States in 2008 approximately one in every 106 workers—over 1.25 million people—was a computer programmer or software engineer. And
  3. 所属分类:其它

    • 发布日期:2010-04-22
    • 文件大小:2097152
    • 提供者:bestchoice
  1. Addison+Wesley+Exploiting+Software+How+To+Break+Code

  2. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.
  3. 所属分类:其它

    • 发布日期:2010-07-23
    • 文件大小:4194304
    • 提供者:shmp2005
  1. Embedded.Linux.System.Design.and.Development

  2. Embedded.Linux.System.Design.and.Development1 Introduction ............................................................................................. 11.1 History of Embedded Linux....................................................21.1.1 Year 19
  3. 所属分类:Linux

    • 发布日期:2008-02-19
    • 文件大小:6291456
    • 提供者:osoon
  1. Programming with Lcc-win

  2. Chapter 1 Introduction to C 1 Why learn C? 1 Program organization 2 Hello 3 Program input 4 What are “function parameters” ? 5 Console mode programs and windows programs 6 An overview of the compilation process 6 The run time environment 7 An overvi
  3. 所属分类:C

    • 发布日期:2010-09-30
    • 文件大小:2097152
    • 提供者:ywj1225
  1. w00w00 on Heap Overflows

  2. w00w00 on Heap Overflows
  3. 所属分类:专业指导

    • 发布日期:2010-11-04
    • 文件大小:40960
    • 提供者:kodwim
  1. 高级操作系统与核心应用工艺与技术

  2. Advanced Operating Systems and Kernel Applications: Techniques and Technologies Yair Wiseman Bar-Ilan University, Israel Song Jiang Wayne State University, USA Hershey • New York InformatIon Contents Chapter 1 Kernel Stack Overflows Elimina Chapter
  3. 所属分类:Linux

    • 发布日期:2010-12-10
    • 文件大小:6291456
    • 提供者:prog_6103
  1. C++ Hackers Guide.pdf

  2. C++ Hackers Guide.pdf Table of Contents Real World Hacks................................................................................................9 Hack 1: Make Code Disappear....................................................................
  3. 所属分类:C++

    • 发布日期:2010-12-10
    • 文件大小:2097152
    • 提供者:dolphin98629
  1. A Bug Hunter

  2. Along the way you'll learn how to: Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Dev
  3. 所属分类:网络安全

    • 发布日期:2012-02-08
    • 文件大小:4194304
    • 提供者:hithdssss
  1. Buffer Overflows and You

  2. Buffer Overflows and You
  3. 所属分类:C

    • 发布日期:2014-08-28
    • 文件大小:3145728
    • 提供者:uc100200
  1. Win32 Buffer Overflows-dark spyrit AKA Barnaby Jack

  2. dark spyrit AKA Barnaby Jack,Win32 Buffer Overflows
  3. 所属分类:其它

    • 发布日期:2008-10-28
    • 文件大小:80896
    • 提供者:topcoder1234
  1.  Buffer overflows 缓冲区溢出

  2.  软件安全最大的威胁----缓冲区溢出  缓冲区:为大量的连续的同类型数据分配一段存储区域  缓冲区溢出:程序员写的数据超过了缓冲区的边界,将会覆盖邻近的区域
  3. 所属分类:系统安全

    • 发布日期:2016-02-18
    • 文件大小:1048576
    • 提供者:baidu_30360575
  1. Attacks_Buffer overflows

  2. Attacks_Buffer overflows 6666666666666666666666666666666666666666666666666666666
  3. 所属分类:C/C++

    • 发布日期:2017-11-05
    • 文件大小:1048576
    • 提供者:hx_airlin
  1. windows heap overflows

  2. 04年black hat上David Litchfield的讲演。研究windows堆溢出必 看。
  3. 所属分类:其它

    • 发布日期:2009-03-19
    • 文件大小:249856
    • 提供者:windbuaa1
  1. How to write Buffer Overflows

  2. 有关缓冲区溢出较为经典的一篇文章。通过例子讲述了缓冲区溢出的编程方法与原理,容易理解。
  3. 所属分类:专业指导

    • 发布日期:2009-04-05
    • 文件大小:103424
    • 提供者:hhweer
« 12 »