banner response packet,
170 command-line packet-injection tool,
151,
157
exhaustive brute-force attacks,
199-200
password probability matrix,
201-11
PATH environment variable,
62
Phiral Research Laboratories,
118
assembled print2 shellcode,
114-18
FIN, X-mas, and Null scans,
163
proactive defense (Shroud),
165-72
PRGA (Pseudo Random Generation Algorithm),
213-14
proactive defense (Shroud),
165-72
program memory segmentation,
18-21
direct parameter access,
71-73
format-string vulnerability,
59–
61
overwriting global offset table,
80-83
reading from arbitrary memory addresses,
61-62
writing to arbitrary memory addresses,
62-71
generalized exploit techniques,
14-15
heap- and bss-based overflows,
41-54
basic heap-based overflow,
41-46
overflowing function pointers,
46-54
null byte termination,
18
program memory segmentation,
18-21
multi-user file permissions,
15-16
program exploitation,
11-14
chaining return into libc calls,
132-33
returning into system( ),
130-31
writing multiple words with single call,
136-38
writing nulls with return into libc,
134-36
stack-based overflows,
23-41
exploiting without exploit code,
27-31
avoiding using other segments,
92-94
common assembly instructions,
84-85
Hello, World program,
87-89
Linux system calls,
85-87
polymorphic shellcode,
102-3
printable ASCII instructions,
101-2
removing null bytes,
94-98
shell-spawning code,
90-92
protocol host fingerprints,
189
Pseudo Random Generation Algorithm (PRGA),
213-14