EXPLOITING SOFTWARE BIBLE

(9 views)

Download FileHES_BIBLE_01_2012.pdf Please login or Register to access downloadables Download Shellcode: From a Simple Bug to OS Control By Amr Thaber Exploiting Format Strings with Python By Craig Wright DPA Exploitation and GOTs with Python By Craig Wright Starting to Write Your Own Linux Schellcode By Craig Wright Beyond Automated Tools and Frameworks: the shellcode injection process  By Craig Wright Understanding conditionals in shellcode By Craig Wright Taking control, Functions to DLL injection By Craig Wright Smashing the Stack By Marco Balduzzi and Mariano Graziano Smashing the Stack 2 By Marco Balduzzi and Mariano Graziano Exploit a Software with Buffer Overflow Vulnerability and Bypassing Aslr Protection By Ahmed Sherif El-Demrdash Reversing EXE with OllyDbg By Nilesh Kumar A Quick “Hands On” Introduction to Packing By Alain Schneider Hacking Applets: A Reverse Engineering Approach By Nilesh Kumar and Ronnie Johndas Hijacking Software Updates with Evilgrade By Mourad Ben Lokhua Direct Object....

April 19, 2022
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

2 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Abhijit Das
Abhijit Das
2 years ago

looks like copied article by nilesh kumar from somewhere

Hakin9 TEAM
Admin
2 years ago
Reply to  Abhijit Das

Hi there,

Could you elaborate? Above is only the table of contents from our very old edition. Nilesh Kumar is an author of two articles, so nothing was copied.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023