ISBN-13: 9781542405010 / Angielski / Miękka / 2017 / 120 str.
This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass. In the second version, we have added how to create a fuzzer for network service and also how to port the exploits to exploitation framework.