You are not signed in. Sign in.

List Books: Buy books on ListBooks.org

Exploiting Software: How to Break Code »

Book cover image of Exploiting Software: How to Break Code by Greg Hoglund

Authors: Greg Hoglund, Gary McGraw, Aviel D. Rubin
ISBN-13: 9780201786958, ISBN-10: 0201786958
Format: Paperback
Publisher: Addison-Wesley
Date Published: February 2004
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Greg Hoglund

Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.

Gary McGraw, Cigital's CTO, is a leading authority on software security. Dr. McGraw is coauthor of the groundbreaking books Building Secure Software and Exploiting Software (both from Addison-Wesley). While consulting for major software producers and consumers, he has published over ninety peer-reviewed technical publications, and functions as principal investigator on grants from DARPA, the National Science Foundation, and NIST's Advanced Technology Program. He serves on the advisory boards of Authentica, Counterpane, and Fortify Software. He is also an advisor to the computer science departments at University of California, Davis, and the University of Virginia, as well as the School of Informatics at Indiana University.

Book Synopsis

Intended for software security professionals, this guide explains the techniques used by malicious hackers against software, describes specific attack patterns, and shows how to uncover new software vulnerabilities. The authors discuss the difference between implementation bugs and architectural flaws, reverse engineering tools, the weaknesses in server and client software, malicious input attacks, buffer overflows, and the construction of a simple Windows XP kernel rootkit that can hide processes and directories. Annotation ©2004 Book News, Inc., Portland, OR

Table of Contents

Attack Patterns
Foreword
Preface
Acknowledgments
1Software - The Root of the Problem1
2Attack Patterns37
3Reverse Engineering and Program Understanding71
4Exploiting Server Software147
5Exploiting Client Software201
6Crafting (Malicious) Input233
7Buffer Overflow277
8Rootkits367
References449
Index453

Subjects