EXPLOITING SOFTWARE BIBLE

Download
File
HES_BIBLE_01_2012.pdf

Shellcode: From a Simple Bug to OS Control
By Amr Thaber

Exploiting Format Strings with Python
By Craig Wright

DPA Exploitation and GOTs with Python
By Craig Wright

Starting to Write Your Own Linux Schellcode
By Craig Wright

Beyond Automated Tools and Frameworks: the shellcode injection process 
By Craig Wright

Understanding conditionals in shellcode
By Craig Wright

Taking control, Functions to DLL injection
By Craig Wright

Smashing the Stack
By Marco Balduzzi and Mariano Graziano

Smashing the Stack 2
By Marco Balduzzi and Mariano Graziano

Exploit a Software with Buffer Overflow Vulnerability and Bypassing Aslr Protection
By Ahmed Sherif El-Demrdash

Reversing EXE with OllyDbg
By Nilesh Kumar

A Quick “Hands On” Introduction to Packing
By Alain Schneider

Hacking Applets: A Reverse Engineering Approach
By Nilesh Kumar and Ronnie Johndas

Hijacking Software Updates with Evilgrade
By Mourad Ben Lokhua

Direct Object Reference or, How a Toddler Can Hack Your Web Application
By Nick Nikiforakis

How to Recover Passwords from a Memory Dump
By Daniel Dieterle

Creating a Fake Wi-Fi Hotspot to Capture Connected Users Information
By Roberto Saia

Deceiving Defenses with Nmap Camouflaged Scanning
By Roberto Saia

Overriding Function Calls in Linux
By Umair Manzoor

Cracking Java Applications with AOP exploits (part 1)
By Daniel Drozdzewski

Cracking Java Applications with AOP Exploits (part 2)
By Daniel Drozdzewski

Cisco IOS Rootkits and Malware: A practical guide
By Jason Nehrboss

Easy Network Security Monitoring with Security Onion
By Daniel Dieterle

Inspecting Https Traffic on Gateways
By Kishin Fatnani

Detecting Ipv6 Rogue Router Incidents Using Bro NSM
By Matti Mantere

The Gentoo Hardened Project: Or How to Minimize Exploits Risks
By Jesus Rivero


Download
File
HES_BIBLE_01_2012.pdf

April 19, 2022
Subscribe
Notify of
guest
2 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Abhijit Das
Abhijit Das
3 years ago

looks like copied article by nilesh kumar from somewhere

Hakin9 TEAM
Admin
3 years ago
Reply to  Abhijit Das

Hi there,

Could you elaborate? Above is only the table of contents from our very old edition. Nilesh Kumar is an author of two articles, so nothing was copied.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.