Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 50
نمايش فراداده

Index

M

MAC addresses, 145, 146

man-in-the-middle (MiM) attack, 186, 190, 196

Media Access Control (MAC) addresses, 145, 146

memory, 16-21

memory declaration, 17

null byte termination, 18

program memory segmentation, 18-21

memory addresses, arbitrary, 61-71

MiM (man-in-the-middle) attack, 186, 190, 196

minimum field width, 70

mov eax instruction, 96

mov instruction, 84, 94

multiple words, writing with single call, 136-38

multi-user file permissions, 15-16