Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 51
نمايش فراداده

Index

N

nasm program, 84

Nathan, Jeff, 151

nemesis packet-injection tool, 151, 157, 231

network layer, 140, 141, 142, 143, 145

networking, 139-72

denial of service (DoS), 160-62

layers, 142-46

network sniffing, 146-56. See also active sniffing

OSI Model, 140-42

overview, 139-40

port scanning, 162-72

FIN, X-mas, and Null Scans, 163

idle scanning, 163-65

proactive defense (Shroud), 165-72

spoofing decoys, 163

stealth SYN scan, 163

TCP/IP hijacking, 156-60

Newsham, Tim, 214-15

next_val variable, 67-69

NFS (number field sieve), 184

nm command, 75-76

No Electronic Theft Act, 14

no operation (NOP), 25

nonorthogonal quantum states, 175

NOP instructions, 102, 107

NOP (no operation), 25

NOP sled

appending shellcode to, 29

bridging gap between shellcode and executing loader code, 107

creating, 29-30

overview, 25

size of, 40-41

using printable characters for, 102

null bytes

removing, 94-98

terminating, 18

Null scans, 163

nulls, writing with return into libc, 134-36

number field sieve (NFS), 184