搜索结果
找到约 8 项符合
Exploits 的查询结果
其他书籍 堆溢出全面介绍 Reliable Windows Heap Exploits
堆溢出全面介绍
Reliable Windows Heap Exploits
文章/文档 Really Hacking SQL A Power Point Presentation on hacking SQL and Exploits
Really Hacking SQL
A Power Point Presentation on hacking SQL and Exploits
Internet/网络编程 I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco
I. Introduction
This code exploits a previously undisclosed vulnerability in the bit string
decoding code in the Microsoft ASN.1 library. This vulnerability is not related
to the bit string vulnerability described in eEye advisory AD20040210-2. Both
vulnerabilities were fixed in the MS04-007 patch. ...
其他书籍 win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。
win32缓冲区溢出实战。原文:Intro to Win32 Exploits。从漏洞发现到漏洞调试和漏洞利用。
技术资料 A_Guide_to_Kernel_Exploitation
A Guide to Kernel Exploitation,Attacking the Core
---
With the number of security countermeasures against user-land exploitation greater
than ever these days, kernel-level exploitation is becoming increasingly popular
among attackers and, generically, exploit writers. Playing with the heart of a c ...
书籍 Feedback Control Theory
Striking developments have taken place since 1980 in feedback control theory. The subject has be-
come both more rigorous and more applicable. The rigor is not for its own sake, but rather that even
in an engineering discipline rigor can lead to clarity and to methodical solutions to problems. The
a ...
技术资料 缓冲区溢出攻击—检测、剖析与预防
对一些恶名昭彰的Internet攻击(如SQL Slammer和Blaster蠕虫)的取证调查,显示了缓冲区溢区是高明的黑客进行攻击时选择的弱点。这些蠕虫会使Internet速度减慢甚至瘫痪,并且需要花费数十亿美元清除它们。目前,威力更强的、更阴险的威胁已经以“Custom exploits”的形式出现,即每一次攻击的exploit都是不同的,从而使expl ...
书籍 Physical Layer Security in Wireless Communications
The ever-increasing demand for private and sensitive data transmission over wireless net-
works has made security a crucial concern in the current and future large-scale, dynamic,
and heterogeneous wireless communication systems. To address this challenge, computer
scientists and engineers have trie ...