Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Buy

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
  • A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.

This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.

What you will learn

  • Create an isolated lab to test and inject shellcodes (Windows and Linux).
  • Understand both Windows and Linux behavior.
  • Learn the assembly programming language.
  • Create shellcode using assembly and Metasploit.
  • Detect buffer overflows.
  • Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux).
  • Exploit development and shellcodes injections (Windows & Linux).
  • Prevent and protect against buffer overflows and heap corruption.

Who This Book Is For

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

Table of Contents

  1. Introduction
  2. Lab Setup
  3. Assembly Language in Linux
  4. Reverse Engineering
  5. Creating Shellcode
  6. Buffer Overflow Attacks
  7. Exploit Development - Part 1
  8. Exploit Development - Part 2
  9. Real World scenarios part 1
  10. Real World scenarios part 2
  11. Real World scenarios part 3
  12. Detection and Prevention
(HTML tags aren't allowed.)

Pro RFID in BizTalk Server 2009 (Expert's Voice in BizTalk)
Pro RFID in BizTalk Server 2009 (Expert's Voice in BizTalk)

The market for Radio Frequency Identification (RFID) technology is expanding rapidly, constituting billions of dollars annually. As more organizations adopt RFID solutions and related equipment, the need to route, map, and execute workflows based on RFID data grows exponentially. Microsoft’s solution to this demand is BizTalk RFID, an...

Simulation and Inference for Stochastic Differential Equations: With R Examples (Springer Series in Statistics)
Simulation and Inference for Stochastic Differential Equations: With R Examples (Springer Series in Statistics)

This book covers a highly relevant and timely topic that is of wide interest, especially in finance, engineering and computational biology. The introductory material on simulation and stochastic differential equation is very accessible and will prove popular with many readers. While there are several recent texts available that cover...

Fundamentals of Computer Security
Fundamentals of Computer Security

This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key...


Pro SQL Server 2005 High Availability
Pro SQL Server 2005 High Availability
Maintaining SQL Server 2005 high availability in a global information environment is the database administrator's greatest practical challenge. Availability is as much about people and processes as it is about technology. Pro SQL Server 2005 High Availability covers the technology, people, processes, and real-world best practices for...
Pheromones and Animal Behavior: Chemical Signals and Signatures
Pheromones and Animal Behavior: Chemical Signals and Signatures

Pheromones and other kinds of chemical communication underlie the behavior of all animals. Building on the strengths of the first edition, widely recognized as the leading text in the subject, this is a comprehensive overview of how pheromones work. Extensively revised and expanded to cover advances made over the last ten years, the book...

The Vein Book
The Vein Book

The Vein Book is a comprehensive reference on veins and venous circulation. In one volume it provides complete, authoritative, and up-to-date information about venous function and dysfunction, bridging the gap between clinical medicine and basic science. It is the single authoritative resource which consolidates present knowledge and...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy