- 30142046475 很实用的一个图片上传得例子 图片上传:生成缩略图 加文字水印 图片水印 51aspx.png为水印图片 远程图片抓取(保存到本地)支持jpg
- ant 蚂蚁算法小程序
- isolated_speech_sources Sources for isolated speech recognition project. Compiled with Visual Studio 2008. Used Visual C++ for gui programming
- thresholdHSI 采用小波变换的方法实现心电信号的滤波
- MSP430-USB-simulator-schematic msp430 仿真器原理图
- Mo-Phong ofdm in wimax using matlab
文件名称:Advanced_buffer_overflow_exploits
介绍说明--下载内容来自于网络,使用问题请自行百度
现在有许多缓冲区溢出攻击代码。早期缓冲区
溢出攻击代码只产生了一个shell (执行程序/ bin / sh ) 。但是,
如今一些缓冲区溢出攻击代码已经很不错的功能。
例如,通过过滤,打开一个socket,打破的chroot ,
等等。本文将试图解释先进的缓冲区溢出
利用技巧根据英特尔x86 Linux操作系统。-Nowadays there are many buffer overflow exploit codes. The early buffer
overflow exploit codes only spawn a shell ( execute /bin/sh ). However,
nowadays some of the buffer overflow exploit codes have very nice features.
For example, passing through filtering, opening a socket, breaking chroot,
and so on. This paper will attempt to explain the advanced buffer overflow
exploit skill under intel x86 linux.
溢出攻击代码只产生了一个shell (执行程序/ bin / sh ) 。但是,
如今一些缓冲区溢出攻击代码已经很不错的功能。
例如,通过过滤,打开一个socket,打破的chroot ,
等等。本文将试图解释先进的缓冲区溢出
利用技巧根据英特尔x86 Linux操作系统。-Nowadays there are many buffer overflow exploit codes. The early buffer
overflow exploit codes only spawn a shell ( execute /bin/sh ). However,
nowadays some of the buffer overflow exploit codes have very nice features.
For example, passing through filtering, opening a socket, breaking chroot,
and so on. This paper will attempt to explain the advanced buffer overflow
exploit skill under intel x86 linux.
相关搜索: exploit
buffer overfl
(系统自动生成,下载前可以参看下载内容)
下载文件列表
Advanced_buffer_overflow_exploits.txt
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
