Shellcode

Results: 175



#Item
61Shellcode / Software / Command shells / Batch file / Exploit / Security token / System call / Shell / Command Prompt / Computing / Scripting languages / System software

An Introduction to MOSDEF Dave Aitel Immunity, Inc http://www.immunitysec.com Who am I?

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
62Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:28:14
63Shellcode / Reverse engineering / Compiler / Binary star / Technology / Programming language implementation / Software / Computing

AN INTRODUCTION TO RADARE2 AN INTRODUCTION TO RADARE2 {alu|l0gic} April 7, 2011

Add to Reading List

Source URL: radare.org

Language: English - Date: 2011-04-07 17:38:57
64X86-64 / X86 / INT / Computer architecture / X86 architecture / Shellcode

Reversing a Simple Shellcode with Radare2 Edd Barrett @vext01 August 12, 2011

Add to Reading List

Source URL: radare.org

Language: English - Date: 2011-09-07 11:20:25
65Computer security / System Management Mode / Rootkit / Unified Extensible Firmware Interface / Coreboot / Shellcode / Flash memory / Trusted Platform Module / Booting / BIOS / System software / Computing

Defeating Signed BIOS Enforcement

Add to Reading List

Source URL: www.mitre.org

Language: English - Date: 2014-03-11 11:39:24
66Malware / Rootkits / Shellcode / Hypervisor / Hacker / Antivirus software / Backdoor / Joanna Rutkowska / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / System software / Cyberwarfare / Computer security

[Black Hat DCAn Uninvited Guest Black Hat DC 2010 Conference Proceedings An Uninvited Guest (Who Won’t Go Home)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
67Windows shell / Software / Computing / Shellcode / Portable Executable / Microsoft Windows

Windows Shellcode Mastery BlackHat Europe 2009 Benjamin CAILLAT ESIEA - SI&S lab

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
68Malware / Software bugs / Shellcode / Antivirus software / Buffer overflow / Computer virus / Code injection / Portable Executable / Hooking / Cyberwarfare / Computer security / Failure

WiShMaster Windows Shellcode Mastery BlackHat EuropeBenjamin CAILLAT

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
69Computer security / Stack buffer overflow / Buffer overflow / Shellcode / Address space layout randomization / Stack / Pointer / PaX / Heap overflow / Software bugs / Computing / Software quality

\x90\x90\x90\x90\x90\x90\x90\x90 Stack Smashing as of Today A State-of-the-Art Overview on Buffer Overflow Protections

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
70Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

PDF Document

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-06-18 08:37:26
UPDATE