|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1005903587 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
171011s2017 caua ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d TEFOD
|d OCLCF
|d UMI
|d IDEBK
|d COO
|d STF
|d TOH
|d UOK
|d CEF
|d KSU
|d VT2
|d OCLCQ
|d DEBBG
|d G3B
|d S9I
|d UAB
|d C6I
|d ERF
|d UKAHL
|d EBLCP
|d OCLCQ
|d OCLCO
|d N$T
|d OCLCQ
|d CZL
|d OCLCO
|d OCL
|d OCLCQ
|
019 |
|
|
|a 1005964648
|a 1031484719
|a 1156234514
|
020 |
|
|
|a 9781593278984
|q (electronic bk.)
|
020 |
|
|
|a 1593278985
|q (electronic bk.)
|
020 |
|
|
|z 1593278802
|
020 |
|
|
|z 9781593278809
|
029 |
1 |
|
|a GBVCP
|b 102052216X
|
035 |
|
|
|a (OCoLC)1005903587
|z (OCoLC)1005964648
|z (OCoLC)1031484719
|z (OCoLC)1156234514
|
037 |
|
|
|a 80C8427C-1CD3-46A6-8F05-9AE08F9C08B9
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TA168.5
|
082 |
0 |
4 |
|a 004
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a PoC GTFO /
|c [Manul Laphroaig [and others]].
|
246 |
3 |
|
|a Book of PoC GTFO
|
246 |
3 |
|
|a Proof of concept or get the fuck out
|
264 |
|
1 |
|a San Francisco :
|b No Starch Press,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
588 |
0 |
|
|a Online resource; title from READ title page (OverDrive, viewed October 12, 2017).
|
500 |
|
|
|a "These are the collected works of the International Journal of Proof or Concept or Get the Fuck Out ..."--Introduction
|
500 |
|
|
|a Includes index.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide. Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text."
|
505 |
0 |
|
|a Intro -- Title Page -- Copyright Page -- Contents -- Introduction -- Chapter 0: A CFP with POC -- 0:1 Let us begin! -- 0:2 iPod Antiforensics -- 0:3 ELFs are dorky, Elves are cool -- 0:4 Epistle to Hats of All Colors -- 0:5 Returning from ELF to Libc -- 0:6 GTFO or #FAIL -- Chapter 1: Proceedings of the Society of PoC∥GTFO -- 1:1 Lend me your ears! -- 1:2 RNG in four lines of Javascript -- 1:3 Serena Butler's TV Typewriter -- 1:4 Making a Multi-Windows PE -- 1:5 This ZIP is also a PDF -- 1:6 Burning a Phone -- 1:7 Sermon on the Divinity of Languages -- Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO -- 2:1 Ring them Bells! -- 2:2 Build your own birdfeeder. -- 2:3 A PGP Matryoshka Doll -- 2:4 Code Execution on a Tamagotchi -- 2:5 Shellcode for MSP430 -- 2:6 Calling putchar() from ELF -- 2:7 POKE of Death for the TRS 80/M100 -- 2:8 This OS is also a PDF -- 2:9 A Vulnerability in Reduced Dakarand -- 2:10 Juggernauty -- Chapter 3: Address on the Smashing of Idols to Bits and Bytes -- 3:1 Fear Not! -- 3:2 Greybeard's Luck -- 3:3 This PDF is a JPEG. -- 3:4 Netwatch for SMM -- 3:5 Packet-in-Packet Mitigation Bypass -- 3:6 An RDRAND Backdoor in Bochs -- 3:7 Kosher Firmware for the Nokia 2720 -- 3:8 Tetranglix Boot Sector -- 3:9 Defusing the Qualcomm Dragon -- 3:10 Tales of Python's Encoding -- 3:11 Angecryption -- Chapter 4: Tract de la Société Secrète -- 4:1 Let me tell you a story -- 4:2 Epistle on the Bountiful Seeds of 0Day -- 4:3 This OS is a Boot Sector -- 4:4 Prince of PoC -- 4:5 New Facedancer Framework -- 4:6 Power Glitching Tamagotchi -- 4:7 A Plausibly Deniable Cryptosystem -- 4:8 Hardening Pin Tumbler Locks -- 4:9 Intro to Chip Decapsulation -- 4:10 Forget Not the Humble Timing Attack -- 4:11 This Truecrypt is a PDF -- 4:12 How to Manually Attach a File to a PDF -- 4:13 Ode to ECB -- Chapter 5: Address to the Inhabitants of Earth.
|
505 |
8 |
|
|a 5:1 It started like this -- 5:2 A Sermon on Hacker Privilege. -- 5:3 ECB: Electronic Coloring Book -- 5:4 An Easter Egg in PCI Express -- 5:5 A Flash PDF Polyglot -- 5:6 This Multiprocessing OS is a Boot Sector -- 5:7 A Breakout Board for Mini-PCIe -- 5:8 Prototyping a generic x86 backdoor in Bochs -- 5:9 Your Cisco blade is booting PoC∥GTFO. -- 5:10 I am my own NOP Sled. -- 5:11 Abusing JSONP with Rosetta Flash -- 5:12 Sexy collision PoCs -- 5:13 Ancestral Voices -- Chapter 6: Old Timey Exploitation -- 6:1 Communion with the Weird Machines -- 6:2 On Giving Thanks -- 6:3 Gekko the Dolphin -- 6:4 This TAR archive is a PDF! -- 6:5 x86 Alchemy and Smuggling -- 6:6 Detecting MIPS Emulation -- 6:7 More Cryptographic Coloring Books -- 6:8 PCB Reverse Engineering -- 6:9 Davinci Seal -- 6:10 Observable Metrics -- Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia -- 7:1 With what shall we commune this evening? -- 7:2 The Magic Number: 0xAA55 -- 7:3 Coastermelt -- 7:4 The Lysenko Sermon -- 7:5 When Scapy is too high-level -- 7:6 Abusing file formats -- 7:7 AES-NI Backdoors -- 7:8 Innovations with Linux core files. -- 7:9 Bambaata speaks from the past. -- 7:11 Cyber Criminal's Song -- Chapter 8: Exploits Sit Lonely on the Shelf -- 8:1 Please stand -- now, please be seated -- 8:2 Witches, Warlocks, and Wassenaar -- 8:3 Compiler Bug Backdoors -- 8:4 A Protocol for Leibowitz -- 8:5 Jiggling into a New Attack Vector -- 8:6 Hypervisor Exploit, Five Years Old -- 8:7 Stegosploit -- 8:8 On Error Resume Next -- 8:9 Unbrick My Part -- 8:10 Backdoors up my Sleeve -- 8:11 Naughty Signals -- 8:12 Weird Crypto -- Useful Tables -- Index -- Colophon -- Footnotes -- Introduction -- Chapter 0: A CFP with POC -- Chapter 1: Proceedings of the Society of PoC∥GTFO -- Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO.
|
505 |
8 |
|
|a Chapter 3: Address on the Smashing of Idols to Bits and Bytes -- Chapter 4: Tract de la Société Secrète -- Chapter 5: Address to the Inhabitants of Earth -- Chapter 6: Old Timey Exploitation -- Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia -- Chapter 8: Exploits Sit Lonely on the Shelf.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Reverse engineering.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Electronic data processing.
|
650 |
|
6 |
|a Rétro-ingénierie.
|
650 |
|
6 |
|a Informatique.
|
650 |
|
7 |
|a data processing.
|2 aat
|
650 |
|
7 |
|a computer science.
|2 aat
|
650 |
|
7 |
|a Electronic data processing.
|2 fast
|0 (OCoLC)fst00906956
|
650 |
|
7 |
|a Computer science.
|2 fast
|0 (OCoLC)fst00872451
|
650 |
|
7 |
|a Reverse engineering.
|2 fast
|0 (OCoLC)fst01096543
|
700 |
1 |
|
|a Laphroaig, Manul,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 1593278802
|z 9781593278809
|w (OCoLC)994485474
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492067528/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33436208
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6048972
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1579331
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis39099806
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14877408
|
994 |
|
|
|a 92
|b IZTAP
|