Skip to Main Content
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
book

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

by James C Foster
April 2005
Intermediate to advanced content levelIntermediate to advanced
700 pages
20h 39m
English
Syngress
Content preview from Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Analysis
At line 32, command-line arguments are checked and validated.
At line 51, the Integer parseInt() method is used to convert the port value sup-
plied on the command line to an integer primitive-type suitable for the Socket
class constructor.
At line 54, a new Socket instance is created using the Socket constructor and
the IP address and port supplied on the command line.The TCP connection is
established during this operation. If an error occurs, such as inability to estab-
lish the desired connection, an IOException instance is thrown.
At line 57, the InputStream instance that data is read from is retrieved from the
Socket instance using the getInputStream() method.
At line 58, the OutputStream instance that data is written from is retr ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

32/64-Bit 80x86 Assembly Language Architecture

32/64-Bit 80x86 Assembly Language Architecture

James Leiterman

Publisher Resources

ISBN: 9781597490054