1.Memory2.Functions3.Exampleofanexploitableprogram3a.Overflowingtheprogram3b.Changingthereturnaddress4.Shellcode4a.Makingthecodeportable4b.Theshellcode5.Writinganexploit5a.Samplezgvexploit5b.Furthertipsonwritingexploits6.Conclusions
(1.Memory2.Functions3.Exampleofanexploitableprogram3a.Overflowingtheprogram3b.Changingthereturnaddress4.Shellcode4a.Makingthecodeportable4b.Theshellcode5.Writinganexploit5a.Samplezgvexploit5b.Furthertipsonwritingexploits6.Conclusions)
[下载]10323656206.rar
|