Dailydave mailing list archives
Re: Shellcoder's Handbook, Second Edition
From: "matthew wollenweber" <mwollenweber () gmail com>
Date: Wed, 29 Aug 2007 17:21:24 -0400
I haven't read the whole book cover to cover, but I've finally managed to spend a bit of time with it. My general opinion is that they've cleaned up the book quite a bit. The first edition was difficult to read. This one is a bit easier. On the whole, the book seems to have refocused on shellcode. That makes sense given the title, but I'm a bit disappointed by this. I mainly enjoyed the first book as it was the best reference on how to exploit software.... the metasploit page is always there to generate shellcode that usually works. This book of course discusses exploitation techniques, but it doesn't seem to go into depth with newer technologies in fuzzing or bypassing exploit protections. I didn't see too much particular to Vista in the book, though it does have a lot regarding Windows 2003. I was particularly attracted by the thought of bypassing Entercept. I've ran into it a few times during pen tests and it's always amusing to get thrown off the box. The book suggests two methods for bypassing Entercep and neither are detailedt. The first is mimicking normal behaviour -- which is obvious, or second, hooking the system call table which is nuts in most cases. I've only ever seen Entercept on important production boxes and injecting custom shell code into a kernel level process to hook the system calls again is probably asking for an explosion. It's probably a book worth having, but I don't think it nearly has the impact of the first book. On 8/19/07, Robert Wesley McGrew <wesley () mcgrewsecurity com> wrote:
I was just browsing around on Amazon, noticed the slightly different cover, and realized that the release date for the Second Ediiton is the 20th: http://www.amazon.com/Shellcoders-Handbook-Discovering-Exploiting-Security/dp/047008023X/ref=pd_sim_b_4/002-9507551-2756861?ie=UTF8&qid=1187579269&sr=1-3 Dave is no longer listed as an author (I hope your content's out of it then!). If anyone's had a look at this, I'd love to see some opinions on how this compares to the first edition, which was good, but had some serious errors, and was never supported on the Wiley site as was promised. The book features, straight from amazon: """ * This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application * New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista * Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored * The companion Web site features downloadable code files """ -- Robert Wesley McGrew http://mcgrewsecurity.com _______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
-- Matthew Wollenweber mwollenweber () gmail com | mjw () cyberwart com www.cyberwart.com
_______________________________________________ Dailydave mailing list Dailydave () lists immunitysec com http://lists.immunitysec.com/mailman/listinfo/dailydave
Current thread:
- Shellcoder's Handbook, Second Edition Robert Wesley McGrew (Aug 20)
- Re: Shellcoder's Handbook, Second Edition Karl Sjödahl - dunceor (Aug 20)
- Re: Shellcoder's Handbook, Second Edition Figueroa, Marco {PBSG} (Aug 20)
- Re: Shellcoder's Handbook, Second Edition matthew wollenweber (Aug 29)