Security Basics mailing list archives
Re: Book on modern exploitation techniques
From: AK <platsakos () gmail com>
Date: Wed, 08 Jun 2011 11:45:30 +0300
Both books cover the exploitation counter-measures you mentioned, provided you have the latest editions (2nd edition for TSH, not sure but I think it is 2nd ed for HtAoE as well). The problem with writing a book on how to counter exploitation mitigations is that, at least under Linux, this is a rapidly moving target (e.g. watch a couple of ASLR bypass videos from two years ago, worked back then, invalidated now). Your best bet would be to focus on kernel exploitation, in which case a book such as the excellent "Attacking the Core" would help a lot. -- What is the air-speed velocity of an unladen swallow? ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Book on modern exploitation techniques Robert Larsen (Jun 08)
- Re: Book on modern exploitation techniques pasquale imperato (Jun 08)
- Re: Book on modern exploitation techniques AK (Jun 08)
- Steganography over TCP Hal Wigoda (Jun 08)
- Re: Steganography over TCP Clement Dupuis (Jun 08)
- Re: Steganography over TCP Curt Purdy (Jun 08)
- Re: Steganography over TCP černý klobouk (Jun 12)
- Steganography over TCP Hal Wigoda (Jun 08)