Skip to Main Content
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
book

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

by James C Foster
April 2005
Intermediate to advanced content levelIntermediate to advanced
700 pages
20h 39m
English
Syngress
Content preview from Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
The primary purpose of this function is to create an environment suitable for exe-
cuting the tool, gleaning the desired data from the tool via integration routines, and
returning the data via the collection interface.The way this is all accomplished will now
be explored.
Lines 14 through 16 validate the arguments passed to the Execute method, as should
always be done for COM interfaces.
Lines 20 through 25 set up the well-known argv and argc arguments that are neces-
sary to call the tool’s rpcdump_main routine.The argv array that is built in these lines
looks like this:
[0] The path to the module, for example. "C:\\rpcdump.exe"
[1] Target host name, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

32/64-Bit 80x86 Assembly Language Architecture

32/64-Bit 80x86 Assembly Language Architecture

James Leiterman

Publisher Resources

ISBN: 9781597490054