黑客必读著作与实用参考书列表

涉及以下几个方面:
C/C++
汇编
操作系统
反汇编
破解
缓存溢出

q Books on C/C++:

·               The C Programming Language by Brian W.Kernighan and Dennis M. Ritchie. Prentice Hall, 1988. The author’s descriptionof C as defined by American National Standard Institute (ANSI), also called the“Old Testament.” It is old-fashioned but remains a must-read. This book also has a home page: http://cm.bell-labs.com/cm/cs/cbook/index.html.

·               1001 Visual C++ Programming Tips, firstedition, by Kris Jamsa. Muska & Lipman, 2001. Not the “Old Testament”, butvery good.

·               “С++Annotations” by Frank B. Brokken (http://www.icce.rug.nl/documents/
cpp.shtml
). This annotated manual on the C++programming language is a must-read for every self-respecting hacker.

·               “comp.lang.c Frequently AskedQuestions” by Steve Summit (http://www.eskimo.com/~scs/C-faq/top.html) is the best.

q On Assembly:

·               The Art of Assembly Language, firstedition, by Randall Hyde. No Starch Press, 2003. One of the most highlyrecommended resources on Assembly.

·               Write Great Code: Understanding the Machine, first edition, by Randall Hyde. No Starch Press, 2004. In addition to theexcellent language description, the book provides information concerning basiccomputer data representation, binary arithmetic and bit operations, memoryorganization and access, Boolean logic, and CPU design.

·               Manuals from Intel and AMD,which, by the way, are available not only for free downloading but also forordering by mail (also for free).

q On the operating system:

·               SDKs/DDKs from Microsoft,containing toolsets and accompanying documentation. You need these softwareproducts, so go and download them.

·               Advanced Windows, third edition, byJeffrey Richter. Microsoft Press, 1997. This is a Bible of the applicationprogrammer.

·               Inside the Windows NT File System byHelen Custer. Microsoft Press, 1994. An excellent description of the Windows NTfile system, and a must have.

·               Inside Windows NT by Helen Custer.Microsoft Press, 1992. Adetailed in-depth investigation of the Windows NT 4.0 architecture andassociated coding implications.

·               Microsoft Windows Internals, fourthedition, by David Solomon and Mark Russinovich. Microsoft Press, 2004. Writtenby two gurus of the hacker’s community, this classic book is an in-depth guideto the Windows kernel. The new edition covers all newest Windows versions,including Windows 2000, Windows XP, and Windows .NET Server 2003.

·               Undocumented Windows 2000 Secrets bySven Schreiber. Addison-Wesley Professional, 2001. This book, written by anoted investigator of the Windows kernel internals, covers the Windows 2000debugging interfaces, symbol files, system memory, and kernel objects; thekernel’s native API; Microsoft PDB file format; and other topics.

q On disassembling:

·               The Art of Disassembly from theReversing-Engineering Network (http://www.reverse-engineering.net/). The bible of the disassembly.

·               Hacker Disassembling Uncovered by KrisKaspersky. A-List Publishing, 2003. A hacker’s advice related to how to analyze programswithout its source code using a debugger and a disassembler.

q On hacking:

·               Phrack (http://www.phrack.org). The best e-zine available containing lots of articles, includingthe ones focusing on stack overflow.

q On the buffer overflow:

·               UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes(http://opensores.thebunker.net/pub/mirrors/blackhat/presentations/bh-usa-01/LSD/bh-usa-01-lsd.pdf). An excellentmanual on the buffer overflow technique and gaining control over remotecomputers.

·               Win32 Assembly Components (http://www.lsd-pl.net/documents/winasm-1.0.1.pdf). Ready-to-use components and exploits.

·               Understanding Windows Shellcode (http://www.hick.org/code/skape/papers/win32-shellcode.pdf). Manual on shellcode development.

黑客必读著作与实用参考书列表

时间: 2024-09-29 17:52:38

黑客必读著作与实用参考书列表的相关文章

值得网页设计师&前端收藏的实用工具列表

原文地址:http://www.uisdc.com/tool-list-web-developers# 无论你是经验丰富的前端,还是刚刚起步的设计师,这些为真正的网页设计师和开发者所准备的实用工具.在线服务.资源和代码片段,都是为你而生的,合理的运用能够让你的网页设计与开发事半功倍. 这次总结的工具总计有40款,它们基本上可以分为8个大类 ·灵感与阅读:这类素材通常是设计案例和酷站,它们启发灵感,给你经验 ·网络社区:汇集Web开发者和设计师的优秀社区 ·网页测速工具:一些最好的网站测速工具 ·

IntelliJ IDEA 实用插件列表

1.Translation : 翻译 2.CodeGlance:代码预览 3.Lombok:优雅编程插件 4.RestFulToolkit:RestFul接口测试 5.GenerateSerialVersionUID :自动生成序列化ID 6.CamelCase:自动驼峰转换(SHIFT+ALT+U) 7.EasyCode:代码生成 8.MyBatisCodeHelperPro:Mybatis插件(高级功能要激活码) 原文地址:https://www.cnblogs.com/gabriel-y/

黑客术语基础知识快速了解

1.肉鸡:所谓“肉鸡”是一种很形象的比方,比方那些能够随意被我们操控的电脑,对方可所以WINDOWS体系,也可所以UNIX/LINUX体系,可所以一般的个人电脑,也可所以大型的服务器,我们能够象操作自己的电脑那样来操作它们,而不被对方所发觉. 2.木马:就是那些表面上伪装成了正常的程序,可是当这些被程序运转时,就会获取体系的整个操控权限.有很多黑客就是 热中与运用木马程序来操控别人的电脑,比方灰鸽子,黑洞,PcShare等等. 3.网页木马:表面上伪装成一般的网页文件或是将罢了的代码直接插入到正

《Vim实用技巧》笔记

Vim实用技巧 Table of Contents 1. Vim决问题的方式 2. 普通模式 3. 插入模式 4. 可视模式 5. 命令行模式 5.1. 操作文本的Ex命令 5.2. range服务说明 5.3. 补全 5.4. 命令行窗口–使用vim的编辑能力编辑Ex命令 5.5. 执行外部命令 6. 管理多个文件 6.1. 缓冲区列表管理 6.2. 参数列表 6.3. 窗口操作 6.4. 标签页操作 7. 打开及保存文件 7.1. 打开文件 7.2. 使用find查找文件 7.3. 使用ne

Python学习随笔_2_基础:列表、元组

一.列表 列表是Python 最常用的数据类型之一,通过列表可以对数据实现最方便的存储.修改等操作. 1.定义列表 1 names = ["Cz","Cao","Zhang","Hui","Yang"] 2 print(names) 2.元素访问:通过下标 1 >>> names = ["Cz","Cao","Zhang",&qu

Objective-C

1.Objective-C语言特性 2.static __block const 3.Object-C的内存管理 4.RunLoop 5.iOS消息传递机制 6.iOS程序生命周期 7.MVC设计模式MVVM 8.UIView CALayer Frame 与bounds 9.根类 NSObject 10.多线程简介 11.数据持久化 12.JSON和XML HTML 自定义报文 13.网络编程 HTTP TCP/IP Socket  ASI AFNetwork 14.AppStore上传 及远程

Rootkit Hacking Technology && Defence Strategy Research

目录 1. The Purpose Of Rootkit 2. Syscall Hijack 3. LKM Module Hidden 4. Network Communication Hidden 5. File Hidden 6. Process Hidden 7. Hidden Port Remote Reverse Connections 8. Programe Replacing 1. The Purpose Of Rootkit Basically, the purpose of r

CTF传送门

https://www.zhihu.com/question/30505597详细见知乎 推荐书: A方向: RE for BeginnersIDA Pro权威指南揭秘家庭路由器0day漏洞挖掘技术自己定操作系统黑客攻防技术宝典:系统实战篇 有各种系统的逆向讲解 B方向: Web应用安全权威指南 最推荐小白,宏观web安全Web前端黑客技术揭秘 黑客秘籍--渗透测试实用指南黑客攻防技术宝典 web实战篇 web安全的所有核心基础点,有挑战性,最常规,最全,学好会直线上升代码审计:企业级web代码

0911内容。

一.列表块: 1.列表图片属性list-style-image:用来定义列表元素中替换列表符号的图像.有两个属性①none:不实用任何列表图像.②url:定义使用列表图像的路径. 2.标记位置属性list-style-position:用来定义列表中标记的显示位置.有两个属性①outside:定义列表标记显示在文本之外.②inside:定义列表标记显示在文本之内. 注意:在使用列表综合属性的时候,如果同时定义了列表的图片属性和列表符号属性,则会显示列表图片,而忽略定义的列表符号. 二.布局与格式