Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities.

Saved in:
Bibliographic Details
Author / Creator:Megahed, Hamza.
Imprint:Birmingham : Packt Publishing, 2018.
Description:1 online resource (336 pages)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12870916
Hidden Bibliographic Details
ISBN:9781788475594
1788475593
1788473736
9781788473736
Notes:Print version record.
Summary:Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-shifting operations; Arithmetic shift operation ; Logical shift; Rotate operation; Summary ; Chapter 4: Reverse Engineering; Debugging in Linux; Debugging in Windows ; Summary; Chapter 5: Creating Shellcode; The basics; Bad characters; The relative address techniqueÂ
Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.
Other form:Print version: Megahed, Hamza. Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities. Birmingham : Packt Publishing, ©2018
Standard no.:9781788473736