Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Buy

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
  • A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.

This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.

What you will learn

  • Create an isolated lab to test and inject shellcodes (Windows and Linux).
  • Understand both Windows and Linux behavior.
  • Learn the assembly programming language.
  • Create shellcode using assembly and Metasploit.
  • Detect buffer overflows.
  • Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux).
  • Exploit development and shellcodes injections (Windows & Linux).
  • Prevent and protect against buffer overflows and heap corruption.

Who This Book Is For

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

Table of Contents

  1. Introduction
  2. Lab Setup
  3. Assembly Language in Linux
  4. Reverse Engineering
  5. Creating Shellcode
  6. Buffer Overflow Attacks
  7. Exploit Development - Part 1
  8. Exploit Development - Part 2
  9. Real World scenarios part 1
  10. Real World scenarios part 2
  11. Real World scenarios part 3
  12. Detection and Prevention
(HTML tags aren't allowed.)

SOA Governance: Governing Shared Services On-Premise and in the Cloud
SOA Governance: Governing Shared Services On-Premise and in the Cloud

The Definitive Guide to Governing Shared Services and SOA Projects

 SOA Governance: Governing Shared Services On-Premise and in the Cloud is the result of a multi-year project to collect proven industry practices for establishing IT governance controls specific to the adoption of SOA...

Practical Radio Frequency Test and Measurement: A Technician's Handbook
Practical Radio Frequency Test and Measurement: A Technician's Handbook

The book will teach readers the basics of performing the tests and measurements used in radio-frequency systems installation, proof of performance, maintenance, and troubleshooting.

Practical Radio Frequency Test and Measurement teaches readers the basics of performing the tests and measurements used in radio-frequency
...

Sams Teach Yourself SQL in 24 Hours (5th Edition)
Sams Teach Yourself SQL in 24 Hours (5th Edition)

In just 24 sessions of one hour or less, you’ll learn how to use SQL to build effective databases, efficiently retrieve your data, and manage everything from performance to security! Using this book’s straightforward, step-by-step approach, you’ll learn hands-on through practical examples. Each lesson...


Any Time, Anywhere Computing: Mobile Computing Concepts and Technology
Any Time, Anywhere Computing: Mobile Computing Concepts and Technology

Mobile communications have permeated the globe in both business and social cultures. In only a few short years, Japan alone has had more than ten million subscribers enter the mobile market. Such explosive popularity is an indication of a strong commercial demand for communications in both the tethered and tetherless environments.

...
CUDA Application Design and Development
CUDA Application Design and Development

As the computer industry retools to leverage massively parallel graphics processing units (GPUs), this book is designed to meet the needs of working software developers who need to understand GPU programming with CUDA and increase efficiency in their projects. CUDA Application Design and Development starts with an introduction to...

Hands-On Data Visualization with Bokeh: Interactive web plotting for Python using Bokeh
Hands-On Data Visualization with Bokeh: Interactive web plotting for Python using Bokeh

Learn how to create interactive and visually aesthetic plots using the Bokeh package in Python

Key Features

  • A step by step approach to creating interactive plots with Bokeh
  • Go from nstallation all the way to deploying your very own Bokeh application
  • Work...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy