This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass.In the second version, we have added how to create a fuzzer for network service and also how to port the exploits to exploitation framework.
Windows Stack Exploitation 2
$46.79
This book provides advanced instruction in cybersecurity, computer science, and ethical hacking techniques.
Additional information
Weight | 0.295 lbs |
---|---|
Dimensions | 21.6 × 0.7 × 27.9 in |
Reviews
There are no reviews yet.