Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 60
نمايش فراداده

Index

W

WEP attacks, 214-27

Fluhrer, Mantin, and Shamir (FMS) attack, 217-27

IP redirection, 216-17

IV-based decryption dictionary tables, 216

keystream reuse, 215-16

offline brute-force attacks, 214-15

WEP (Wired Equivalent Privacy), 211-14

wireless 802.11b encryption, 211-14

wireless 802.11b encryption, 211-14

words, multiple, writing with single call, 136-38

Wozniak, Steve, 3

wrapper, using, 133-34

write( ) function, 87, 88

write permission, 15

writing shellcode, 84-129

ASCII printable polymorphic

shellcode, 103-18

assembled print2 shellcode, 114-18

print2.asm, 112-14

printable_exploit.c, 109-11

print.asm, 107-9

avoiding using other segments, 92-940

common assembly instructions, 84-85

dissembler, 118-29

cleared_stack.c code, 125-29

only_print.c code, 122-25

Hello, World program, 87-89

Linux system calls, 85-87

polymorphic shellcode, 102-3

printable ASCII instructions, 101-2

removing null bytes, 94-98

shell-spawning code, 90-92

using stack, 98-101