Authors: Greg Hoglund, Gary McGraw, Aviel D. Rubin
ISBN-13: 9780201786958, ISBN-10: 0201786958
Format: Paperback
Publisher: Addison-Wesley
Date Published: February 2004
Edition: (Non-applicable)
Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.
Gary McGraw, Cigital's CTO, is a leading authority on software security. Dr. McGraw is coauthor of the groundbreaking books Building Secure Software and Exploiting Software (both from Addison-Wesley). While consulting for major software producers and consumers, he has published over ninety peer-reviewed technical publications, and functions as principal investigator on grants from DARPA, the National Science Foundation, and NIST's Advanced Technology Program. He serves on the advisory boards of Authentica, Counterpane, and Fortify Software. He is also an advisor to the computer science departments at University of California, Davis, and the University of Virginia, as well as the School of Informatics at Indiana University.
Intended for software security professionals, this guide explains the techniques used by malicious hackers against software, describes specific attack patterns, and shows how to uncover new software vulnerabilities. The authors discuss the difference between implementation bugs and architectural flaws, reverse engineering tools, the weaknesses in server and client software, malicious input attacks, buffer overflows, and the construction of a simple Windows XP kernel rootkit that can hide processes and directories. Annotation ©2004 Book News, Inc., Portland, OR
Attack Patterns | ||
Foreword | ||
Preface | ||
Acknowledgments | ||
1 | Software - The Root of the Problem | 1 |
2 | Attack Patterns | 37 |
3 | Reverse Engineering and Program Understanding | 71 |
4 | Exploiting Server Software | 147 |
5 | Exploiting Client Software | 201 |
6 | Crafting (Malicious) Input | 233 |
7 | Buffer Overflow | 277 |
8 | Rootkits | 367 |
References | 449 | |
Index | 453 |