Exploiting Software: How to Break Code -- Chapter 7, Buffer Overflow

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems and antivirus software not keeping out the bad guys? This book provides the answers. In particular, this free excerpt takes a look at buffer overflow attacks and the harm they can inflict.


As a registered member of SearchAppSecurity.com, you're entitled to a complimentary copy of Chapter 7 of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw and published by Addison-Wesley Professional.

This chapter, "Buffer Overflow," discusses what buffer overflow attacks are, how to combat them and why they remain the crown jewel of attacks, and are likely to remain so for years to come.



Exploiting Software: How to Break Code

Book description:

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out.

This must-have book may shock you -- and it will certainly educate you. Getting beyond the script kiddie treatment found in many hacking books, you will learn about

  • Why software exploit will continue to be a serious problem
  • When network security mechanisms do not work
  • Attack patterns
  • Reverse engineering
  • Classic attacks against server software
  • Surprising attacks against client software
  • Techniques for crafting malicious input
  • The technical details of buffer overflows
  • Rootkits

Exploiting Software is filled with the tools, concepts, and knowledge necessary to break software.

>> Read "Chapter 7: Buffer Overflow" now.

>> Buy the book





This was first published in January 2006

Dig deeper on Building Software Project Teams

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close