Uninformed: Informative Information for the Uninformed

Vol 4» 2006.Jun


Bibliography

1
Conover, Matt and Oded Horovitz. Reliable Windows Heap Exploits.

http://cansecwest.com/csw04/csw04-Oded+Connover.ppt; accessed May 6, 2006.

2
Kazienko, Przemyslaw and Piotr Dorosz. Hacking an SQL Server.

http://www.windowsecurity.com/articles/Hacking_an_SQL_Server.html; accessed May 7, 2006.

3
Litchfield, David. Windows Heap Overflows.

http://www.blackhat.com/presentations/win-usa-04/bh-win-04-litchfield/bh-win-04-litchfield.ppt; accessed May 6, 2006.

4
Howard, Michael. Protecting against Pointer Subterfuge (Kinda!).

http://blogs.msdn.com/michael_howard/archive/2006/01/30/520200.aspx; accessed May 6, 2006.

5
Microsoft Corporation. UnhandledExceptionFilter.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/debug/base/unhandledexceptionfilter.asp; accessed May 6, 2006.

6
Microsoft Corporation. SetUnhandledExceptionFilter.

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/debug/base/setunhandledexceptionfilter.asp; accessed May 6, 2006.

7
Murphy, Matthew. Windows Media Player Plug-In Embed Overflow;

http://www.milw0rm.com/exploits/1505; accessed May 7, 2006.

8
SkyLined. InternetExploiter.

http://www.edup.tudelft.nl/~bjwever/exploits/InternetExploiter2.zip; accessed May 7, 2006.