Penetration Testing with Shellcode PDF

Penetration Testing with Shellcode PDF

Name:
Penetration Testing with Shellcode PDF

Published Date:
02/14/2018

Status:
[ Withdrawn ]

Description:

Publisher:
PACKT - Packt Publishing, Inc.

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
Need Help?
NO LONGER AVAILABLE

Master Shellcode to leverage the buffer overflow concept

About This Book

• Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit

• Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts

• A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Who This Book Is For

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

What You Will Learn

• Create an isolated lab to test and inject shellcodes (Windows and Linux).

• Understand both Windows and Linux behavior.

• Learn the assembly programming language.

• Create shellcode using assembly and Metasploit.

• Detect buffer overflows.

• Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux).

• Exploit development and shellcodes injections  (Windows & Linux).

• Prevent and protect against buffer overflows and heap corruption.

In Detail

Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.

This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.

Style and approach

This practical guide helps you understand buffer overflows and how to become creative about creating shellcode, looking inside code and analyzing it, and mastering the injection of shellcode into infected code. At the end of the book, there is a recap with a real-world scenario.


Edition : 18
Number of Pages : 336
Published : 02/14/2018

History


Related products

Practical Data Science with Python
Published Date: 09/30/2021
$13.2
Spring Boot and Angular
Published Date: 12/16/2022
$12

Best-Selling Products

ISO/DIS 10360-5:1998
Published Date: 07/01/1998
Geometrical Product Specifications (GPS) - Acceptance and reverification tests for coordinate measuring machines (CMM) - Part 5: CMMs used with multiple styli
$9.9
ISO/DIS 11608-3:1998
Published Date: 12/01/1998
Pen-Injectors for Medical Use - Part 3: Finished Cartridges - Requirements and Test Methods
$15.3
ISO/DIS 11614:1994
Published Date: 05/26/1994
Reciprocating Internal Combustion Compression-Ignition Engines - Apparatus for Measurement of the Opacity and for Determination of the Light Absorption Coefficient of Exhaust Gas - DRAFT
$22.5
ISO/DIS 1179-2:1995
Published Date: 09/01/1995
Connections for General Use and Fluid Power - Ports and Stud Ends with ISO 228-1 Threads with Elastomeric or Metal-to-Metal Sealing - Part 2: Heavy-Duty (S series) and Light-Duty (L series) Stud Ends with Elastomeric Sealing (type E) (Revision of ISO 1179:1981)
$9.9
ISO/DIS 1179-3:1995
Published Date: 09/01/1995
Connections for General Use and Fluid Power - Ports and Stud Ends with ISO 228-1 Threads with Elastomeric or Metal-to-Metal Sealing - Part 3: Light-Duty (L series) Stud Ends with Sealing by O-Ring with Retaining Ring (Types G and H) (Revision of ISO 1179:1981)
$11.4
ISO/DIS 1179-4:1995
Published Date: 09/01/1995
Connections for General Use and Fluid Power - Ports and Stud Ends with ISO 228-1 Threads with Elastomeric or Metal-to-Metal Sealing - Part 4: Stud Ends for General Use Only with Metal-to-Metal Sealing (Type B) (Revision of ISO 1179:1981)
$9.9