Skip to Main Content
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
book

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

by James C Foster
April 2005
Intermediate to advanced content levelIntermediate to advanced
700 pages
20h 39m
English
Syngress
Content preview from Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Writing Security
Components
Solutions in this Chapter:
COM
ATL
Adding COM Extensions to the RPCDUMP Tool
Related Chapters: Chapter 14
Chapter 13
539
Summary
Solutions Fast Track
Frequently Asked Questions
327_SSPC_13.qxd 2/25/05 4:35 PM Page 539
Introduction
Advanced security tools often depend on functionality implemented by other security
tools. Because of this fact, a security tool author has a decision to make between writing
new code and reusing code from an existing security tool. As with any type of code
reuse, reusing functionality from an existing code base enables benefits such as faster
development cycles.
Reusing existing code depends largely ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

32/64-Bit 80x86 Assembly Language Architecture

32/64-Bit 80x86 Assembly Language Architecture

James Leiterman

Publisher Resources

ISBN: 9781597490054