Hidden Bibliographic Details
ISBN: | 9781788475594 1788475593 1788473736 9781788473736
|
Notes: | Print version record.
|
Summary: | Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-shifting operations; Arithmetic shift operation ; Logical shift; Rotate operation; Summary ; Chapter 4: Reverse Engineering; Debugging in Linux; Debugging in Windows ; Summary; Chapter 5: Creating Shellcode; The basics; Bad characters; The relative address technique Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.
|
Other form: | Print version: Megahed, Hamza. Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities. Birmingham : Packt Publishing, ©2018
|
Standard no.: | 9781788473736
|