Hacking: The Art of Exploitation: The Art of Exploitation by Jon Erickson

Hacking: The Art of Exploitation: The Art of Exploitation by Jon Erickson

Author:Jon Erickson
Language: eng
Format: mobi, epub
Tags: COMPUTERS / Security / General
ISBN: 9781593273385
Publisher: No Starch Press
Published: 2008-01-28T00:00:00+00:00


Example Internet Datagram Header

Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) are only four bits in size and there aren’t any 4-bit variable types in C, the Linux header definition splits the byte differently depending on the byte order of the host. These fields are in the network byte order, so, if the host is little-endian, the IHL should come before Version since the byte order is reversed. For our purposes, we won’t really be using either of these fields, so we don’t even need to split up the byte.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.