|Listed in category:
Have one to sell?

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

by Koziol, Jack; Litchfield,... | PB | Acceptable
US $6.55
ApproximatelyS$ 8.42
Condition:
Acceptable
Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ... Read moreabout condition
3 available1 sold
Breathe easy. Free shipping and returns.
Other people bought this. 1 has already sold.
Shipping:
Free Economy Shipping.
Located in: Aurora, Illinois, United States
Delivery:
Estimated between Thu, 11 Sep and Tue, 16 Sep to 94104
Estimated delivery dates - opens in a new window or tab include seller's handling time, origin ZIP Code, destination ZIP Code and time of acceptance and will depend on shipping service selected and receipt of cleared paymentcleared payment - opens in a new window or tab. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Seller pays for return shipping.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:146241410318
Last updated on Sep 04, 2025 01:26:26 SGTView all revisionsView all revisions

Item specifics

Condition
Acceptable
A book with obvious wear. May have some damage to the cover but integrity still intact. The binding may be slightly damaged but integrity is still intact. Possible writing in margins, possible underlining and highlighting of text, but no missing pages or anything that would compromise the legibility or understanding of the text. See all condition definitionsopens in a new window or tab
Seller Notes
“Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend ...
Binding
Paperback
Book Title
The Shellcoder's Handbook
Weight
2 lbs
Product Group
Book
IsTextBook
Yes
ISBN
9780764544682

About this product

Product Identifiers

Publisher
Wiley & Sons, Incorporated, John
ISBN-10
0764544683
ISBN-13
9780764544682
eBay Product ID (ePID)
5960347

Product Key Features

Number of Pages
644 Pages
Publication Name
Shellcoder's Handbook : Discovering and Exploiting Security Holes
Language
English
Publication Year
2004
Subject
Security / General
Type
Textbook
Subject Area
Computers
Author
David Litchfield, Jack koziol, Sinan Noir Eren, Chris Anley, Dave Aitel
Format
Trade Paperback

Dimensions

Item Height
1.4 in
Item Weight
34.3 Oz
Item Length
9.3 in
Item Width
7.5 in

Additional Product Features

Intended Audience
Trade
LCCN
2003-027629
Reviews
"...80%...anyone developing their own software may be surprised by how easily flaws can be exploited and fixed..." ( PC Utilities , July 2004) "...essential for administrators who want to secure computer systems under their management..." ( Computer Weekly , March 2004) "...has caused some raised eyebrows in the technical community..." (www.infoworld.com, 17 March 2004)
TitleLeading
The
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
About the Authors.Credits.Acknowledgments.Part 1: Introduction to Exploitation: Linux on x86.Chapter 1: Before You Begin.Chapter 2: Stack Overflows.Chapter 3: Shellcode.Chapter 4: Introduction to Format String Bugs.Chapter 5: Introduction to Heap Overflows.Part 2: Exploiting More Platforms: Windows, Solaris, and Tru64.Chapter 6: The Wild World of Windows.Chapter 7: Windows Shellcode.Chapter 8: Windows Overflows.Chapter 9: Overcoming Filters.Chapter 10: Introduction to Solaris Exploitation.Chapter 11: Advanced Solaris Exploitation.Chapter 12: HP Tru64 Unix Exploitation.Part 3: Vulnerability Discovery.Chapter 13: Establishing a Working Environment.Chapter 14: Fault Injection.Chapter 15: The Art of Fuzzing.Chapter 16: Source Code Auditing: Finding Vulnerabilities in C-Based Languages.Chapter 17: Instrumented Investigation: A Manual Approach.Chapter 18: Tracing for Vulnerabilities.Chapter 19: Binary Auditing: Hacking Closed Source Software.Part 4: Advanced Materials.Chapter 20: Alternative Payload Strategies.Chapter 21: Writing Exploits that Work in the Wild.Chapter 22: Attacking Database Software.Chapter 23: Kernel Overflows.Chapter 24: Exploiting Kernel Vulnerabilities.Index.
Synopsis
Uncover, exploit, and close security holes in any software or operating systemEvery day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.The Shellcoder's Handbook is written by a unique author team, consisting of "white hat" corporate security experts and underground hacker-cracker types, who are the most respected contributors to Bugtraq, a vulnerability tracking mailing list. They take you from introductory-level exploitation and exposing vulnerabilities in binaries to advanced content on kernel overflows. In addition, they provide you with advanced techniques to close new security holes that are not yet known to the public but could cause devastating consequences. With all this information, youa'll be able to develop your own discovery process and quickly determine whether a security hole is truly exploitable. The methods discussed will also dramatically improve your penetration testing skills in order to achieve a "100% Penetration Rate Guaranteed."The Shellcodera's Handbook shows you how to: Find out where security holes come from and how to close them so they never occur again Pinpoint vulnerabilities in popular operating systems (including Windows r , Linux r , and Solaris TM ) and applications (including MS SQL Server and Oracle r databases) Write exploits for use with filters and hack closed source systems to understand what countermeasures need to be taken Deal with discovered vulnerabilities using previously unpublished advanced exploits and techniques, Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases) Details how to deal with discovered vulnerabilities, sharing some previously unpublished advanced exploits and techniques
LC Classification Number
QA76.9.A25

Item description from the seller

About this seller

ThriftBooks

98.9% positive feedback19.8M items sold

Joined Mar 2015
Just Voted on Newsweek - ThriftBooks ranks #1 America's Best Online Shops 2025 in Office, Electronics & Media sector, Media category!!ThriftBooks is a fully independent seller of used books, having ...
See more

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
4.9

Seller feedback (5,736,133)

All ratings
Positive
Neutral
Negative
    • v***o (229)- Feedback left by buyer.
      Past month
      Verified purchase
      Great quality book
    See all feedback