• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Penetration Testing with Shellcode: Detect, exploit, and secure network-level

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,602
Solutions
2
Reputation
32
Reaction score
100,445
Points
2,313
Credits
32,540
‎6 Years of Service‎
 
76%
ndice.jpg


Key Features

Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit

Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts

A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security is always a major concern for your application, your system, or your environment.

This book’s main goal is to build up your skills for low-level security exploits, enabling you to find vulnerabilities and cover loopholes with shellcode, assembly, and Metasploit.

This book covers topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers how to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and at the network level.

What you will learn

Create an isolated lab to test and inject Shellcodes (Windows and Linux)

Understand both Windows and Linux behavior in overflow attacks

Learn the assembly programming language

Create Shellcode using assembly and Metasploit

Detect buffer overflows

Debug and reverse-engineer using tools such as gdb, edb, and immunity

(Windows and Linux)

Exploit development and Shellcode injections (Windows and Linux)

Prevent and protect against buffer overflows and heap corruption

Who this book is for

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

Table of Contents

Introduction

Lab Setup

Assembly Language in Linux

Reverse Engineering

Creating Shellcode

Buffer Overflow Attacks

Exploit Development – Part 1

Exploit Development – Part 2

Real World scenarios part 1

Real World scenarios part 2

Real World scenarios part 3

Detection and Prevention

Code:
https://www.amazon.es/Penetration-Testing-Shellcode-Hamza-Megahed/dp/1788473736

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top