Shellcoder's Programming uncovered
author: Kris Kaspersky(Armerica)
chapter 1: tools
assemble lanuage
MS-DOS Borland TASM
Windows MASM FASM(flat assembler)(http://flatassembler.net) NASM(http://nasm.sourceforge.net)
link
visual studil windows SDK
ulink(Yury Haron)
debug/disassemble
microsoft windiws Debugger(WDB)
kernet Debugger: SoftIce(Numega) OllyDbg(Oleh Yuschuk)
IDA Pro
ProcDump PE-Tools Lord-PE Iceix
Editor
HIEW QVIEW
模拟器
Bochs
Reference:
http://cm.bell-labs.com/cm/cs/cbook/index.html
http://www.eskimo.com/~scs/C-faq/top.html
The art of Assembly Language
Write Great Code: Understanding the Machine (author: Randall Hyde)
The art of Disassembly http://www.reverse-engineering.net
Microsoft Windows Internals
Undocumented Windows 2000 Secrets
Inside windows NT
Inside the Windows NT File System
Advanced Windows
Chapter 16
Reference
http://www.peterszor.com/virusresearchpapers.html
http://securityresponse.symantec.com/avcenter/reference/analysis.alapper.worm.pdf
http://www.cs.ucsd.edu/~savage/papers/IEEESP03.pdf
http://www.inetsecurity.info/downloads/papers/MSRPCDCOM.pdf
http://www.cerias.purdue.edu/homes/spaf/tech-reps/823.pdf
http://www.deter.com/unix/papers/internet_worm.pdf
Chapter 19
unix: a.out COFF(Common Object File Format) ELF(Executable and Linkable Format)
a.out( .txt --code .tata --data .bass--data)
COFF --> Windows PE
ELF
http://www.ibiblio.org/pub/historic-linux/ftp-archives/sunsite.unc.edu/Nov-06-1994/GCC/ELF.doc.tar.gz)
http://www.nai.com/common/mdeia/vil/pdf/mvanvoers_VB_conf%202000.pdf
Chapter 23
nmap http://www.insecure.org/nmap
Firewalk http://www.packetfactory.net/firewalk/firewalk-final.pdf
Hping http://www.hping.org/papers.html
OpneNet http://www.opennet.ru
Chapter 24
Ettercap http://ettercap.sourceforge.net
Arpoison http://arpoison.sourceforge.net
Arpmonitor http://paginas.terra.com.br/informatica/gleicon/code
Remote Arpwatch http://www.raccoon.kiev.ua/projects/remarp
http://www.robertgraham.com/pubs/sniffing-faq.html
Chapter 29
wireless network security http://csrc.nist.gov/publication/nistpubs/800-48/NIST_SP_800-48.pdf
Bluetooth Security http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
Bluetooth security protocol, attacks and applications http://www.item.ntnu.no/faq/ttm4705/kollokvie_presentasjoner_2004/bluetooth_security.ppt
Chapter 30
http://www.propel.com
http://www.khelekore.org/rabbit
2008年1月3日星期四
订阅:
博文评论 (Atom)

没有评论:
发表评论