Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 23,96

EUR 16,54 (41%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

The Shellcoder's Handbook: Discovering and Exploiting Security Holes par [Anley, Chris, Heasman, John, Lindner, Felix, Richarte, Gerardo]
Publicité sur l'appli Kindle

The Shellcoder's Handbook: Discovering and Exploiting Security Holes Format Kindle

5.0 étoiles sur 5 1 commentaire client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 23,96

Descriptions du produit

Présentation de l'éditeur

  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
  • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
  • The companion Web site features downloadable code files

Quatrième de couverture

The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built–in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary–code execution vulnerabilities still allow attackers to run code of their choice on your system with disastrous results.

In a nutshell, this book is about code and data and what happens when the two become confused. You′ll work with the basic building blocks of security bugs assembler, source code, the stack, the heap, and so on. You′ll experiment, explore, and understand the systems you′re running and how to better protect them.

  • Become familiar with security holes in Windows, Linux, Solaris, Mac OS X, and Cisco′s IOS
  • Learn how to write customized tools to protect your systems, not just how to use ready–made ones

  • Use a working exploit to verify your assessment when auditing a network

  • Use proof–of–concept exploits to rate the significance of bugs in software you′re developing

  • Assess the quality of purchased security products by performing penetration tests based on the information in this book

  • Understand how bugs are found and how exploits work at the lowest level

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 1807 KB
  • Nombre de pages de l'édition imprimée : 747 pages
  • Pagination - ISBN de l'édition imprimée de référence : 047008023X
  • Editeur : Wiley; Édition : 2 (16 février 2011)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B004P5O38Q
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : 5.0 étoiles sur 5 1 commentaire client
  • Classement des meilleures ventes d'Amazon: n°219.845 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile
Voir le commentaire client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Broché
C'est un très bouquin pour ceux qui s'intéresse aux Shell codes!
A lire, malgré qu'il soit en anglais!
Par contre, à déconseiller aux novices!
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur (beta) HASH(0x902ec48c) étoiles sur 5 41 commentaires
115 internautes sur 117 ont trouvé ce commentaire utile 
HASH(0x902d48d0) étoiles sur 5 Excellent material, but... 11 mai 2004
Par Omar A. Herrera Reyna - Publié sur
Format: Broché
Not for beginners as others have previously stated, you require deep knowledge of C, assembler and IA32 architecture as well as some knowledge of the Linux and Windows operating systems. If you have this then it will suffice (Even if you have not ever heard of a buffer overflow before).
What amazes me, and the reason of me not giving five stars to the book, is the enormous amount of errors in the book (no one else has talked about this on previous reviews). These go from forgetting to include memory allocation routines in some sample code and putting incorrect labels in some diagrams to talking about certain parts of code while actually showing completely different lines of code or talking about different addresses in the explanations from the ones on the sample code and program output that they talk about.
For example, on page 90 the authors wrote:
" Let's take a look at two assembly instructions that correspond to the free() routine finding the previous chunk
0x42073ff8 <_int_free+136>: mov 0xfffffff8 (%edx),%eax
0x42073ffb <_int_free+139>: sub %eax,%esi
In the first instruction (mov 0x8 (%esi), %edx), %edx is 0x80499b8, the address of..."
The instruction being referred to at the last sentence should be "mov 0xfffffff8 (%edx),%eax". "mov 0x8 (%esi), %edx" appears many lines below this paragraph, in another code sample, and it is completely unrelated to the explanation given there.
Of course, people familiar with these topics who also have a deep knowledge of the required programming languages and architectures will catch these flaws easily. The problem is that there are so many of them that it gets annoying at some point and you end asking yourself why do the editorial reviewers didn't do their job properly.
Also, I bought this book almost as soon as it went out for sale, yet as of this date (may 2004), the only material found in the web page of the book is the source code to most of the examples. Definitely much less compared to all the material that the authors promised in the book to be there (so don't expect to find more than this).
It is an excellent reference book though, and if you take the time to read the book thoroughly and make notes to fix the errors in the book you will find that even this activity is rewarding. Some might even argue that the authors put the errors there on purpose to keep script kiddies away from this knowledge, but I don't think that would be OK with a book like this which has created so much expectation. Hopefully the next edition will have all this fixed.
25 internautes sur 26 ont trouvé ce commentaire utile 
Par Elijah D - Publié sur
Format: Broché
I've always been facinated by the amount of work security researchers put into finding vulnerabilities. This is a very good book on software vulnerabilities. It's also very current as it examines a number of the recently widely publicized vulnerabilities. It also rightly points out the fact that Linux/Unix are not as secure as a lot of people out there would like the public to believe.
The ways to get around stack protection outlined in this book was an eye opener for me.
I thought I had very good knowledge of the material the book covers until I actually read it. It is clear that as software shops continue to plug vulnerabilties, people will continue to find new ways to exploit software.
Clearly, this book is not for the casual reader. This is essentially a book for people who have above average assembly language and c/c++ skills.
36 internautes sur 40 ont trouvé ce commentaire utile 
HASH(0x902d44bc) étoiles sur 5 The Real Deal... 10 avril 2004
Par Jeff Pike - Publié sur
Format: Broché
Here's how this ambitious learning resource is laid out:


1) Before You Begin
2) Stack Overflows
3) Shellcode
4) Introduction to Format String Bugs
5) Introduction to Heap Overflows

PART 2 EXPLOITING MORE PLATFORMS: Windows, Solaris, and Tru64

6) The Wild World of Windows
7) Windows Shellcode
8) Windows Overflows
9) Overcoming Filters
10) Introduction to Solaris Exploitation
11) Advanced Solaris Exploitation
12) HP Tru64 Unix Exploitation


13) Establishing a Working Environment
14) Falut Injection
15) The Art of Fuzzing
16) Souce Code Auditing: Finding Vulnerabilities in C-based Languages
17) Instrumented Investigation: A manual approach
18) Tracing for Vulnerabilities
19) Binary Auditing: Hacking Closed Source Software


20) Alternative Payload Strategies
21) Writing Exploits that Work in the Wild
22) Attacking Database Software
23) Kernel Overflows
24) Exploiting Kernel Vulnerabilities

This is not just another security book! The wizards from bugtraq have shared a significant portion of their craft and tools with us in this book. For that, I am most grateful. Given the technical prowess of many of the authors, I was pleasantly supprised by their willingness and ability to explain concepts in very detailed, clear, and concise manner.

After spending some time with this book, I became somewhat disappointed by the number of errors it contains. A few solid technical reviewers could have easily caught these errors and made the end product much better. Another disappoint is that all of the stuff that the book promises at the website still hasn't appeared.

This book is not for beginners. This book assumes reasonable competence with C, Assemply, and computer architecture... all at an intermediate level.

This book stands out for the info it provides. Other books have tease and hint at some of these concepts for maybe a sentence or two, but they never truly explain any of them. It's rare to find explanations of this material. There is no fluff and no confusion (except for errors in the examples). This is well done, and a joy to read. It is the definitivie text book for students of vulnerability discovery.
28 internautes sur 32 ont trouvé ce commentaire utile 
HASH(0x902cfef4) étoiles sur 5 Excellent security book although misleading title 21 mai 2004
Par AdV - Publié sur
Format: Broché
The title "Shellcoder's handbook" made me reluctant to even buy this book. I thought it would go about explaining exploiting stack, heap overruns, bypassing memory exploitation methods and so on in order to execute shell code: basically, a book for hacking and I didn't like that. Nonetheless, it took me a glance of the list of authors and the table of contents to realize that this book goes beyond exploitation and into core penetration testing and vulnerability discovery methods. Hopefully, like rational and ethical software security engineers will do, this book will be used more for vulnerability discovery and benign exploitation rather than malicious exploitation.
Parts 1 and 2 are a great introduction of OS internal, system calls, memory management, and in-depth analysis of security bug exploitation; thus making them relevant for part 3: "Vulnerability Discovery". Part 3 goes into great depth on how discover security bugs. No so often do we have the brightest minds in the art of software vulnerability discovery, penetration testing, or "ethical hacking" joining forces. The variety of ways to discover security bugs is what we need to learn in order to ship secure software or to successfully secure existing software applications. Great Job!
13 internautes sur 14 ont trouvé ce commentaire utile 
HASH(0x902cfeb8) étoiles sur 5 Excellent Book 26 septembre 2005
Par Joaquin Jares - Publié sur
Format: Broché Achat vérifié
In the last few months I've read several white hat/black hat books on security, and I must say that this one is the best. Not for the completely new to the subject, and a little too quick to explain some complex topics, but still a great book. I have only two complaints, which aren't making me give this book less than a 5:

1. There's a lot of errors in the content, and following such an advance book when you can't trust the code gets complicated.

2. There are a few chapters, particularly in section 3, where the style hasn't been neutralized, and you can absolutely tell that the book was written by 5 different people with almost no coordination.

Other than that, excellent book. I'm looking forward to buying Database Hacker's Handbook, by the same editor.
Ces commentaires ont-ils été utiles ? Dites-le-nous