Penetration testing with Shellcode : detect, exploit, and secure network-level and operating system vulnerabilities [E-Book] / Hamza Megahed.
Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you topic...
Saved in:
Full text |
|
Personal Name(s): | Megahed, Hamza, author |
Edition: |
1st edition |
Imprint: |
Birmingham :
Packt Publishing,
2018
|
Physical Description: |
336 pages (online resource) |
Note: |
englisch |
ISBN: |
9781788473736 9781788475594 1788473736 1788475593 |
Subject (LOC): |
LEADER | 02759nam a2200349 i 4500 | ||
---|---|---|---|
001 | PACKT0000101 | ||
008 | 200212s2018 ob 000 0 eng d | ||
020 | |a 1788473736 | ||
020 | |a 1788475593 | ||
020 | |a 9781788473736 | ||
020 | |a 9781788475594 | ||
035 | |a (Sirsi) a802786 | ||
041 | 0 | |a eng | |
082 | 0 | 0 | |a 005.8 |
100 | 1 | |a Megahed, Hamza, |e author | |
245 | 1 | 0 | |a Penetration testing with Shellcode : |b detect, exploit, and secure network-level and operating system vulnerabilities |h [E-Book] / |c Hamza Megahed. |
250 | |a 1st edition | ||
264 | 1 | |a Birmingham : |b Packt Publishing, |c 2018 |e (Packt) |f Packt20200417 | |
300 | |a 336 pages (online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a englisch | ||
505 | 0 | |a Penetration testing with Shellcode : detect, exploit, and secure network-level and operating system vulnerabilities -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction -- Chapter 2: Lab Setup -- Chapter 3: Assembly Language in Linux -- Chapter 4: Reverse Engineering -- Chapter 5: Creating Shellcode -- Chapter 6: Buffer Overflow Attacks -- Chapter 7: Exploit Development - Part 1 -- Chapter 8: Exploit Development - Part 2 -- Chapter 9: Real-World Scenarios - Part 1 -- Chapter 10: Real-World Scenarios - Part 2 -- Chapter 11: Real-World Scenarios - Part 3 -- Chapter 12: Detection and Prevention -- Other Books You May Enjoy -- Index. | |
520 | 3 | |a Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit. This book will teach you topics ranging from memory management and assembly to compiling and extracting Shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit Shellcode for Linux and Windows along with Metasploit Shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios. By the end of this book, you will have become an expert in Shellcode and will understand how systems are compromised both at the operating system and network level. | |
650 | 0 | |a Networking and Servers | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks -- Security measures | |
856 | 4 | 0 | |u http://portal.igpublish.com/iglibrary/search/PACKT0000101.html |z Volltext |
915 | |a zzwFZJ3 | ||
596 | |a 1 | ||
949 | |a XX(802786.1) |w AUTO |c 1 |i 802786-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 17/4/2020 |x UNKNOWN |z UNKNOWN |1 ONLINE |