搜索结果

找到约 8 项符合 Exploits 的查询结果

其他书籍 堆溢出全面介绍 Reliable Windows Heap Exploits

堆溢出全面介绍 Reliable Windows Heap Exploits
https://www.eeworm.com/dl/542/391407.html
下载: 180
查看: 1040

文章/文档 Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits

Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits
https://www.eeworm.com/dl/652/482789.html
下载: 113
查看: 1050

Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. ...
https://www.eeworm.com/dl/620/152835.html
下载: 92
查看: 1097

其他书籍 win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。

win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。
https://www.eeworm.com/dl/542/175194.html
下载: 65
查看: 1057

技术资料 A_Guide_to_Kernel_Exploitation

A Guide to Kernel Exploitation,Attacking the Core --- With the number of security countermeasures against user-land exploitation greater than ever these days, kernel-level exploitation is becoming increasingly popular among attackers and, generically, exploit writers. Playing with the heart of a c ...
https://www.eeworm.com/dl/979681.html
下载: 8
查看: 9324

书籍 Feedback Control Theory

Striking developments have taken place since 1980 in feedback control theory. The subject has be- come both more rigorous and more applicable. The rigor is not for its own sake, but rather that even in an engineering discipline rigor can lead to clarity and to methodical solutions to problems. The a ...
https://www.eeworm.com/dl/522454.html
下载: 5
查看: 123

技术资料 缓冲区溢出攻击—检测、剖析与预防

对一些恶名昭彰的Internet攻击(如SQL Slammer和Blaster蠕虫)的取证调查,显示了缓冲区溢区是高明的黑客进行攻击时选择的弱点。这些蠕虫会使Internet速度减慢甚至瘫痪,并且需要花费数十亿美元清除它们。目前,威力更强的、更阴险的威胁已经以“Custom exploits”的形式出现,即每一次攻击的exploit都是不同的,从而使expl ...
https://www.eeworm.com/dl/846017.html
下载: 9
查看: 222

书籍 Physical Layer Security in Wireless Communications

The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have trie ...
https://www.eeworm.com/dl/522054.html
下载: 1
查看: 117