Introduction

  1. , The UNIX Family 103

  2. , Mac OS X 195

  3. , Windows 269

The best way to learn theoretical concepts is to apply them, and this is the goal of the chapters comprising Part II of the book. In Chapters 4, 5 and 6 , we will drill down into the details of various techniques to successfully and reliably exploit different subsystems on different operating systems. In addition to describing the final exploiting code, we will focus on the steps (along with the issues and the workarounds) that lead to the creation of the specific technique. In this way, we will achieve something more important than creating a working trick—we will build a methodology.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset