Back to Cptr427Winter2010

Hacking Exposed Chapter 10: Hacking Code

Common exploit techniques

Buffer Overflows and Design Flaws

Input Validation Attacks

Stack Buffer Overflows

Countermeasures

Remote Unauthenticated Exploits

Authenticated Attacks

Extracting and Cracking passwords

Remote Control and Back doors

Covering Tracks

General countermeasures

Windows Security Features

Windows Resource Protection

Service Hardening