PoC GTFO /
"This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
San Francisco :
No Starch Press,
[2017]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Intro
- Title Page
- Copyright Page
- Contents
- Introduction
- Chapter 0: A CFP with POC
- 0:1 Let us begin!
- 0:2 iPod Antiforensics
- 0:3 ELFs are dorky, Elves are cool
- 0:4 Epistle to Hats of All Colors
- 0:5 Returning from ELF to Libc
- 0:6 GTFO or #FAIL
- Chapter 1: Proceedings of the Society of PoC∥GTFO
- 1:1 Lend me your ears!
- 1:2 RNG in four lines of Javascript
- 1:3 Serena Butler's TV Typewriter
- 1:4 Making a Multi-Windows PE
- 1:5 This ZIP is also a PDF
- 1:6 Burning a Phone
- 1:7 Sermon on the Divinity of Languages
- Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO
- 2:1 Ring them Bells!
- 2:2 Build your own birdfeeder.
- 2:3 A PGP Matryoshka Doll
- 2:4 Code Execution on a Tamagotchi
- 2:5 Shellcode for MSP430
- 2:6 Calling putchar() from ELF
- 2:7 POKE of Death for the TRS 80/M100
- 2:8 This OS is also a PDF
- 2:9 A Vulnerability in Reduced Dakarand
- 2:10 Juggernauty
- Chapter 3: Address on the Smashing of Idols to Bits and Bytes
- 3:1 Fear Not!
- 3:2 Greybeard's Luck
- 3:3 This PDF is a JPEG.
- 3:4 Netwatch for SMM
- 3:5 Packet-in-Packet Mitigation Bypass
- 3:6 An RDRAND Backdoor in Bochs
- 3:7 Kosher Firmware for the Nokia 2720
- 3:8 Tetranglix Boot Sector
- 3:9 Defusing the Qualcomm Dragon
- 3:10 Tales of Python's Encoding
- 3:11 Angecryption
- Chapter 4: Tract de la Société Secrète
- 4:1 Let me tell you a story
- 4:2 Epistle on the Bountiful Seeds of 0Day
- 4:3 This OS is a Boot Sector
- 4:4 Prince of PoC
- 4:5 New Facedancer Framework
- 4:6 Power Glitching Tamagotchi
- 4:7 A Plausibly Deniable Cryptosystem
- 4:8 Hardening Pin Tumbler Locks
- 4:9 Intro to Chip Decapsulation
- 4:10 Forget Not the Humble Timing Attack
- 4:11 This Truecrypt is a PDF
- 4:12 How to Manually Attach a File to a PDF
- 4:13 Ode to ECB
- Chapter 5: Address to the Inhabitants of Earth.
- 5:1 It started like this
- 5:2 A Sermon on Hacker Privilege.
- 5:3 ECB: Electronic Coloring Book
- 5:4 An Easter Egg in PCI Express
- 5:5 A Flash PDF Polyglot
- 5:6 This Multiprocessing OS is a Boot Sector
- 5:7 A Breakout Board for Mini-PCIe
- 5:8 Prototyping a generic x86 backdoor in Bochs
- 5:9 Your Cisco blade is booting PoC∥GTFO.
- 5:10 I am my own NOP Sled.
- 5:11 Abusing JSONP with Rosetta Flash
- 5:12 Sexy collision PoCs
- 5:13 Ancestral Voices
- Chapter 6: Old Timey Exploitation
- 6:1 Communion with the Weird Machines
- 6:2 On Giving Thanks
- 6:3 Gekko the Dolphin
- 6:4 This TAR archive is a PDF!
- 6:5 x86 Alchemy and Smuggling
- 6:6 Detecting MIPS Emulation
- 6:7 More Cryptographic Coloring Books
- 6:8 PCB Reverse Engineering
- 6:9 Davinci Seal
- 6:10 Observable Metrics
- Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia
- 7:1 With what shall we commune this evening?
- 7:2 The Magic Number: 0xAA55
- 7:3 Coastermelt
- 7:4 The Lysenko Sermon
- 7:5 When Scapy is too high-level
- 7:6 Abusing file formats
- 7:7 AES-NI Backdoors
- 7:8 Innovations with Linux core files.
- 7:9 Bambaata speaks from the past.
- 7:11 Cyber Criminal's Song
- Chapter 8: Exploits Sit Lonely on the Shelf
- 8:1 Please stand
- now, please be seated
- 8:2 Witches, Warlocks, and Wassenaar
- 8:3 Compiler Bug Backdoors
- 8:4 A Protocol for Leibowitz
- 8:5 Jiggling into a New Attack Vector
- 8:6 Hypervisor Exploit, Five Years Old
- 8:7 Stegosploit
- 8:8 On Error Resume Next
- 8:9 Unbrick My Part
- 8:10 Backdoors up my Sleeve
- 8:11 Naughty Signals
- 8:12 Weird Crypto
- Useful Tables
- Index
- Colophon
- Footnotes
- Introduction
- Chapter 0: A CFP with POC
- Chapter 1: Proceedings of the Society of PoC∥GTFO
- Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO.
- Chapter 3: Address on the Smashing of Idols to Bits and Bytes
- Chapter 4: Tract de la Société Secrète
- Chapter 5: Address to the Inhabitants of Earth
- Chapter 6: Old Timey Exploitation
- Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia
- Chapter 8: Exploits Sit Lonely on the Shelf.