This book is dedicated to anyone and everyone who understands that hacking and learning is a way to live your life, not a day job or semi-ordered list of instructions found in a thick book. You’ll work with the basic building blocks of security bugs, assembler, source code, the stack, the heap, and so on. The prerequisites of this book require you to have basic programming knowledge and understanding of IT concepts but in my opinion this is not enough. This books is expertly written without much introductions or basics which makes this book a pretty hard one to read and definitely not a joke. If you have a good understanding of programming concepts, x86, assembly, exploit development and want to learn more about various types of advanced exploits like stack overflow, heap overflow and exploit development, Return Oriented Programming, Fuzzing, ASLR/DEP handling and a lot more, this book is for you.

Contents:

Chapter 1 Before You Begin

Chapter 2 Stack Overflows

Chapter 3 Shellcode

Chapter 4 Introduction to Format String Bugs

Chapter 5 Introduction to Heap Overflows

Chapter 6 The Wild World of Windows

Chapter 7 Windows Shellcode

Chapter 8 Windows Overflows

Chapter 9 Overcoming Filters

Chapter 10 Introduction to Solaris Exploitation

Chapter 11 Advanced Solaris Exploitation

Chapter 12 OS X Shellcode

Chapter 13 Cisco IOS Exploitation

Chapter 14 Protection Mechanisms

Chapter 15 Establishing a Working Environment

Chapter 16 Fault Injection

Chapter 17 The Art of Fuzzing

Chapter 18 Source Code Auditing: Finding Vulnerabilities in C-Based Languages

Chapter 19 Instrumented Investigation: A Manual Approach

Chapter 20 Tracing for Vulnerabilities

Chapter 21 Binary Auditing: Hacking Closed Source Software

Chapter 22 Alternative Payload Strategies

Chapter 23 Writing Exploits that Work in the Wild

Chapter 24 Attacking Database Software

Chapter 25 Unix Kernel Overflows

Chapter 26 Exploiting Unix Kernel Vulnerabilities

Chapter 27 Hacking the Windows Kernel

The Shellcoder’s Handbook: Discovering and Exploiting Security Holes 2nd Edition

Click here to download.



Note: Use Virtual Machine and scan on VirusTotal before downloading any program on Host Machine for your privacy.