Cargando…

PoC GTFO /

"This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out. PoC GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Laphroaig, Manul (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : No Starch Press, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • Title Page
  • Copyright Page
  • Contents
  • Introduction
  • Chapter 0: A CFP with POC
  • 0:1 Let us begin!
  • 0:2 iPod Antiforensics
  • 0:3 ELFs are dorky, Elves are cool
  • 0:4 Epistle to Hats of All Colors
  • 0:5 Returning from ELF to Libc
  • 0:6 GTFO or #FAIL
  • Chapter 1: Proceedings of the Society of PoC∥GTFO
  • 1:1 Lend me your ears!
  • 1:2 RNG in four lines of Javascript
  • 1:3 Serena Butler's TV Typewriter
  • 1:4 Making a Multi-Windows PE
  • 1:5 This ZIP is also a PDF
  • 1:6 Burning a Phone
  • 1:7 Sermon on the Divinity of Languages
  • Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO
  • 2:1 Ring them Bells!
  • 2:2 Build your own birdfeeder.
  • 2:3 A PGP Matryoshka Doll
  • 2:4 Code Execution on a Tamagotchi
  • 2:5 Shellcode for MSP430
  • 2:6 Calling putchar() from ELF
  • 2:7 POKE of Death for the TRS 80/M100
  • 2:8 This OS is also a PDF
  • 2:9 A Vulnerability in Reduced Dakarand
  • 2:10 Juggernauty
  • Chapter 3: Address on the Smashing of Idols to Bits and Bytes
  • 3:1 Fear Not!
  • 3:2 Greybeard's Luck
  • 3:3 This PDF is a JPEG.
  • 3:4 Netwatch for SMM
  • 3:5 Packet-in-Packet Mitigation Bypass
  • 3:6 An RDRAND Backdoor in Bochs
  • 3:7 Kosher Firmware for the Nokia 2720
  • 3:8 Tetranglix Boot Sector
  • 3:9 Defusing the Qualcomm Dragon
  • 3:10 Tales of Python's Encoding
  • 3:11 Angecryption
  • Chapter 4: Tract de la Société Secrète
  • 4:1 Let me tell you a story
  • 4:2 Epistle on the Bountiful Seeds of 0Day
  • 4:3 This OS is a Boot Sector
  • 4:4 Prince of PoC
  • 4:5 New Facedancer Framework
  • 4:6 Power Glitching Tamagotchi
  • 4:7 A Plausibly Deniable Cryptosystem
  • 4:8 Hardening Pin Tumbler Locks
  • 4:9 Intro to Chip Decapsulation
  • 4:10 Forget Not the Humble Timing Attack
  • 4:11 This Truecrypt is a PDF
  • 4:12 How to Manually Attach a File to a PDF
  • 4:13 Ode to ECB
  • Chapter 5: Address to the Inhabitants of Earth.
  • 5:1 It started like this
  • 5:2 A Sermon on Hacker Privilege.
  • 5:3 ECB: Electronic Coloring Book
  • 5:4 An Easter Egg in PCI Express
  • 5:5 A Flash PDF Polyglot
  • 5:6 This Multiprocessing OS is a Boot Sector
  • 5:7 A Breakout Board for Mini-PCIe
  • 5:8 Prototyping a generic x86 backdoor in Bochs
  • 5:9 Your Cisco blade is booting PoC∥GTFO.
  • 5:10 I am my own NOP Sled.
  • 5:11 Abusing JSONP with Rosetta Flash
  • 5:12 Sexy collision PoCs
  • 5:13 Ancestral Voices
  • Chapter 6: Old Timey Exploitation
  • 6:1 Communion with the Weird Machines
  • 6:2 On Giving Thanks
  • 6:3 Gekko the Dolphin
  • 6:4 This TAR archive is a PDF!
  • 6:5 x86 Alchemy and Smuggling
  • 6:6 Detecting MIPS Emulation
  • 6:7 More Cryptographic Coloring Books
  • 6:8 PCB Reverse Engineering
  • 6:9 Davinci Seal
  • 6:10 Observable Metrics
  • Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia
  • 7:1 With what shall we commune this evening?
  • 7:2 The Magic Number: 0xAA55
  • 7:3 Coastermelt
  • 7:4 The Lysenko Sermon
  • 7:5 When Scapy is too high-level
  • 7:6 Abusing file formats
  • 7:7 AES-NI Backdoors
  • 7:8 Innovations with Linux core files.
  • 7:9 Bambaata speaks from the past.
  • 7:11 Cyber Criminal's Song
  • Chapter 8: Exploits Sit Lonely on the Shelf
  • 8:1 Please stand
  • now, please be seated
  • 8:2 Witches, Warlocks, and Wassenaar
  • 8:3 Compiler Bug Backdoors
  • 8:4 A Protocol for Leibowitz
  • 8:5 Jiggling into a New Attack Vector
  • 8:6 Hypervisor Exploit, Five Years Old
  • 8:7 Stegosploit
  • 8:8 On Error Resume Next
  • 8:9 Unbrick My Part
  • 8:10 Backdoors up my Sleeve
  • 8:11 Naughty Signals
  • 8:12 Weird Crypto
  • Useful Tables
  • Index
  • Colophon
  • Footnotes
  • Introduction
  • Chapter 0: A CFP with POC
  • Chapter 1: Proceedings of the Society of PoC∥GTFO
  • Chapter 2: The Children's Bible Coloring Book of PoC∥GTFO.
  • Chapter 3: Address on the Smashing of Idols to Bits and Bytes
  • Chapter 4: Tract de la Société Secrète
  • Chapter 5: Address to the Inhabitants of Earth
  • Chapter 6: Old Timey Exploitation
  • Chapter 7: PoC∥GTFO, Calisthenics and Orthodontia
  • Chapter 8: Exploits Sit Lonely on the Shelf.