Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks
FAC '09 Proceedings of the 5th International Conference on Foundations of Augmented Cognition. Neuroergonomics and Operational Neuroscience: Held as Part of HCI International 2009
Feedback-driven binary code diversification
ACM Transactions on Architecture and Code Optimization (TACO) - Special Issue on High-Performance Embedded Architectures and Compilers
Hi-index | 0.00 |
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, HackerTable of contentsPart I: Introduction to Ethical DisclosureChapter 1. Ethics of Ethical HackingChapter 2. Ethical Hacking and the Legal SystemChapter 3. Proper and Ethical DisclosurePart II: Penetration Testing and ToolsChapter 4. Using MetasploitChapter 5. Using the BackTrack LiveCD Linux DistributionPart III: Exploits 101Chapter 6. Programming Survival SkillsChapter 7. Basic Linux ExploitsChapter 8. Advanced Linux ExploitsChapter 9. Shellcode StrategiesChapter 10. Writing Linux ShellcodeChapter 11. Basic Windows ExploitsPart IV: Vulnerability AnalysisChapter 12. Passive AnalysisChapter 13. Advanced Static Analysis with IDA ProChapter 14. Advanced Reverse EngineeringChapter 15. Client-Side Browser ExploitsChapter 16. Exploiting Windows Access Control Model for Local Elevation of PrivilegeChapter 17. Intelligent Fuzzing with SulleyChapter 18. From Vulnerability to ExploitChapter 19. Closing the Holes: MitigationPart V: Malware AnalysisChapter 20. Collecting Malware and Initial AnalysisChapter 21. Hacking MalwareIndex