Master Shellcode to leverage the buffer overflow concept
Security is always a major concern for
your application, your system, or your
environment. This book's main goal
is to build up your skills for low-level
security exploits, enabling you to find
vulnerabilities and cover loopholes with
Shellcode, assembly, and Metasploit.
This book covers topics ranging from
memory management and assembly to
compiling and extracting Shellcode and
using syscalls and dynamically locating
functions in memory. This book also covers
how to compile 64-bit Shellcode for Linux
and Windows along with Metasploit
Shellcode tools. Lastly, this book will
also show you to how to write your own
exploits with intermediate techniques,
using real-world scenarios.
By the end of this book, you will have
become an expert in Shellcode and will
understand how systems are compromised
both at the operating system and
at the network level.
This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.
Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.
Hamza Megahed is a penetration tester, a Linux kernel expert, and a security researcher. He is interested in exploit development and cryptography, with a background in memory management and return-oriented programming. He has written many shellcodes; some of them were published in shell-storm and exploit-db. Also, he has written articles about information security and cryptographic algorithms.
Key Features
- Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
- Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
- A step-by-step guide that will take you from low-level security skills to covering loops with shellcode
Book Description
Security is always a major concern for
your application, your system, or your
environment. This book's main goal
is to build up your skills for low-level
security exploits, enabling you to find
vulnerabilities and cover loopholes with
Shellcode, assembly, and Metasploit.
This book covers topics ranging from
memory management and assembly to
compiling and extracting Shellcode and
using syscalls and dynamically locating
functions in memory. This book also covers
how to compile 64-bit Shellcode for Linux
and Windows along with Metasploit
Shellcode tools. Lastly, this book will
also show you to how to write your own
exploits with intermediate techniques,
using real-world scenarios.
By the end of this book, you will have
become an expert in Shellcode and will
understand how systems are compromised
both at the operating system and
at the network level.
What you will learn
- Create an isolated lab to test and
- inject Shellcodes (Windows and
- Linux)
- Understand both Windows and Linux
- behavior in overflow attacks
- Learn the assembly programming
- language
- Create Shellcode using assembly
- and Metasploit
- Detect buffer overflows
- Debug and reverse-engineer using
- tools such as gdb, edb, and immunity
- (Windows and Linux)
- Exploit development and Shellcode
- injections (Windows and Linux)
- Prevent and protect against buffer
- overflows and heap corruption
Who this book is for
This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.
Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.
Hamza Megahed is a penetration tester, a Linux kernel expert, and a security researcher. He is interested in exploit development and cryptography, with a background in memory management and return-oriented programming. He has written many shellcodes; some of them were published in shell-storm and exploit-db. Also, he has written articles about information security and cryptographic algorithms.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.