Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Author :
Publisher : БХВ-Петербург
Total Pages : 322
Release :
ISBN-10 : 9781931769617
ISBN-13 : 1931769613
Rating : 4/5 (613 Downloads)

Book Synopsis Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits by : Ivan Sklyarov

Download or read book Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits written by Ivan Sklyarov and published by БХВ-Петербург. This book was released on 2006 with total page 322 pages. Available in PDF, EPUB and Kindle. Book excerpt: Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.


Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits Related Books

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Language: en
Pages: 322
Authors: Ivan Sklyarov
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: БХВ-Петербург

GET EBOOK

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they c
The Basics of Hacking and Penetration Testing
Language: en
Pages: 223
Authors: Patrick Engebretson
Categories: Computers
Type: BOOK - Published: 2013-06-24 - Publisher: Elsevier

GET EBOOK

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethi
CEH Certified Ethical Hacker Study Guide
Language: en
Pages: 424
Authors: Kimberly Graves
Categories: Study Aids
Type: BOOK - Published: 2010-06-03 - Publisher: John Wiley & Sons

GET EBOOK

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this co
Hackers Beware
Language: en
Pages: 802
Authors: Eric Cole
Categories: Computers
Type: BOOK - Published: 2002 - Publisher: Sams Publishing

GET EBOOK

Discusses the understanding, fears, courts, custody, communication, and problems that young children must face and deal with when their parents get a divorce.
Rootkits and Bootkits
Language: en
Pages: 449
Authors: Alex Matrosov
Categories: Computers
Type: BOOK - Published: 2019-05-07 - Publisher: No Starch Press

GET EBOOK

Rootkits and Bootkits will teach you how to understand and counter sophisticated, advanced threats buried deep in a machine’s boot process or UEFI firmware. W