This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections.
Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass.
|Product dimensions:||8.50(w) x 11.00(h) x 0.21(d)|