<html>
<head>
  <meta http-equiv="content-type" content="text/html; charset=iso-8859-1" />
  <meta name="author" content="Daisuke Shimamoto" />
  <meta name="keywords" content="security, windows, kernel, sysenter, system service, programming" />
  <meta name="description" content="Daisuke Shimamoto's page on his studies at univeristy." />
  <meta name="robots" content="all" />
  <title>Links</title>
  <link rel="stylesheet" style="text/css" href="main.css" />
  <style type="text/css">
  .desc {
    margin: 1em 0 1em 1em;
  }
  </style>
</head>

<body>

<h1>Daisuke Shimamoto
@ <a href="http://www.yl.is.s.u-tokyo.ac.jp/">Yonezawa Lab</a></h1>

<div id="menubar">
  <div id="menutop"><a href="/~disk-ec7/">Top</a></div>
  <div id="menugt"><a href="g_thesis.html">Graduation Thesis</a></div>
  <div id="menumt"><a href="studies.html">Master Thesis</a></div>
  <div id="menulnk"><a href="links.html">Links</a></div>
</div>

<h2>Links</h2>
<div class="t1">
<div>
  <a href="http://www.rootkit.com/">Rootkit</a>
  <div class="desc">
    Homepage by Greg Hoglund, author of Exploiting Software.
    Many works done on rootkits. Mainly for Windows.
  </div>
</div>
<div>
  <a href="http://www.phrack.org/">Phrack</a>
  <div class="desc">
    Many articles on hacking, cracking and so on. The famous article on
    buffer-overflow, "Smashing the Stack for Fun and Profit", by Aleph One can
    also be obtained on this site. 
  </div>
</div>
<div>
  <a href="http://www.windowsitlibrary.com/Documents/Book.cfm?DocumentID=356">
    Undocumented Windows NT</a>
  <div class="desc">
    You can read this book on the inside of Windows for free.
    As the title suggests, many of the contents have never been documented
    by Microsoft.
  </div>
</div>
<div>
  <a href="http://vx.netlux.org/">VX Heavens</a>
  <div class="desc">
    You can download many viruses here.
  </div>
</div>
<div>
  <a href="http://www.uniformed.org/">Uninformed</a>
  <div class="desc">
    Fairly new site about rootkits, exploits and reverse engineering.
    Has many useful stuff if your working deep inside the kernel of
    Windows.
  </div>
</div>
<div>
  <a href="http://www.milw0rm.com/">MILW0RM</a>
</div>
<div class="desc">
  Has a lot of exploit codes for various kind of software
  vulnerabilities. (Executables, Web Apps, etc.)
</div>
<!--
    <div>
      <a href=""></a>
    </div>
    <div class="desc">
    </div>
-->
<script src="http://www.google-analytics.com/urchin.js" type="text/javascript">
</script>
<script type="text/javascript">
  _uacct = "UA-604248-1";
  urchinTracker();
</script>
</body>
</html>
