All posts by Loudagonda

Windows Stack Exploitation

This book gives intrinsic details of exploiting stack overflows in Windows applications. It walks the reader through various steps that are necessary for identifying stack overflow vulnerabilities in Windows applications. It also teaches how a reader should actually go about exploiting these vulnerabilities and bypass various Windows protections. Overall, this is a great tutorial for beginners as well as people who are inclined to understand the inner details of Windows protection mechanisms and bypass.

windows1

Buy it at Amazon

Embedded Device Security Course: Pwn Linux Operating System Devices

This course is an introduction for the reader into the wonderful world of embedded device exploitation.The course is supposed to be a tutorial guide that helps a reader understand the various skills required for hacking an embedded device. As the world is getting more and more into the phenomenon of “Internet of Things”, such skill sets can be useful to hack from a simple intelligent light bulb to hacking into a car.

This course book goes into details of exploiting MIPS and ARM based devices. Also it focuses on teaching how to bypass DEP and ASLR protection in embedded devices.

embedded4

Buy it at Amazon

Embedded Device Security: Pwn Real Time Operating Systems

This book introduces the reader to wonderful world of embedded device hacking and real time operating systems. This book is written for hackers, hobbyists, developers, system programmers as well as penetration testers to understand how someone would go about trying to analyze and assess the security of an embedded device running a real time operating system. The book is supposed to be a tutorial guide for readers. So sit back, relax and enjoy the read!!

embedded3

Buy it at Amazon