Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Hamza Megahed
- 出版商: Packt Publishing
- 出版日期: 2018-02-15
- 售價: $1,380
- 貴賓價: 9.5 折 $1,311
- 語言: 英文
- 頁數: 346
- 裝訂: Paperback
- ISBN: 1788473736
- ISBN-13: 9781788473736
-
相關分類:
Penetration-test 滲透測試
立即出貨 (庫存=1)
買這商品的人也買了...
-
$680$680 -
$2,600$2,470 -
$798Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
-
$1,370$1,302 -
$1,540$1,463 -
$811Rust 權威指南 (The Rust Programming Language (Covers Rust 2018))
-
$780$663 -
$1,520$1,444 -
$479$455 -
$1,650$1,568 -
$505自動化測試實戰 -- 基於 TestNG \ JUnit \ Robot Framework \ Selenium
-
$1,200$948 -
$600$468 -
$414$393 -
$653重學 Java 設計模式
-
$839$797 -
$648$616 -
$1,700$1,615 -
$880$695 -
$520$406 -
$600$468 -
$720$562 -
$780$616 -
$450$356 -
$580$458
商品描述
Master Shellcode to leverage the buffer overflow concept
Key Features
- Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
- Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
- A step-by-step guide that will take you from low-level security skills to covering loops with shellcode
Book Description
Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.
This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.
By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.
What you will learn
- Create an isolated lab to test and inject shellcodes (Windows and Linux).
- Understand both Windows and Linux behavior.
- Learn the assembly programming language.
- Create shellcode using assembly and Metasploit.
- Detect buffer overflows.
- Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux).
- Exploit development and shellcodes injections (Windows & Linux).
- Prevent and protect against buffer overflows and heap corruption.
Who This Book Is For
This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.
Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.
Table of Contents
- Introduction
- Lab Setup
- Assembly Language in Linux
- Reverse Engineering
- Creating Shellcode
- Buffer Overflow Attacks
- Exploit Development - Part 1
- Exploit Development - Part 2
- Real World scenarios part 1
- Real World scenarios part 2
- Real World scenarios part 3
- Detection and Prevention