Penetration Testing with Shellcode

Detect, exploit, and secure network-level and operating system vulnerabilities

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Penetration Testing with Shellcode by Hamza Megahed, Packt Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Hamza Megahed ISBN: 9781788475594
Publisher: Packt Publishing Publication: February 14, 2018
Imprint: Packt Publishing Language: English
Author: Hamza Megahed
ISBN: 9781788475594
Publisher: Packt Publishing
Publication: February 14, 2018
Imprint: Packt Publishing
Language: English

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
  • A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security is always a major concern for your application, your system, or your environment.

This book’s main goal is to build up your skills for low-level security exploits, enabling you to find vulnerabilities and cover loopholes with shellcode, assembly, and Metasploit.

This book covers topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers how to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and at the network level.

What you will learn

  • Create an isolated lab to test and inject Shellcodes (Windows and Linux)
  • Understand both Windows and Linux behavior in overflow attacks
  • Learn the assembly programming language
  • Create Shellcode using assembly and Metasploit
  • Detect buffer overflows
  • Debug and reverse-engineer using tools such as gdb, edb, and immunity
  • (Windows and Linux)
  • Exploit development and Shellcode injections (Windows and Linux)
  • Prevent and protect against buffer overflows and heap corruption

Who this book is for

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Master Shellcode to leverage the buffer overflow concept

Key Features

Book Description

Security is always a major concern for your application, your system, or your environment.

This book’s main goal is to build up your skills for low-level security exploits, enabling you to find vulnerabilities and cover loopholes with shellcode, assembly, and Metasploit.

This book covers topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers how to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and at the network level.

What you will learn

Who this book is for

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

More books from Packt Publishing

Cover of the book Hands-On Enterprise Automation with Python by Hamza Megahed
Cover of the book Mastering Xamarin.Forms by Hamza Megahed
Cover of the book Professional Plone Development by Hamza Megahed
Cover of the book PostgreSQL 9 Admin Cookbook by Hamza Megahed
Cover of the book Instant Dependency Management with RequireJS How-to by Hamza Megahed
Cover of the book Troubleshooting Ubuntu Server by Hamza Megahed
Cover of the book Raspberry Pi Robotic Projects - Third Edition by Hamza Megahed
Cover of the book Hadoop MapReduce Cookbook by Hamza Megahed
Cover of the book Instant RubyMotion App Development by Hamza Megahed
Cover of the book Redis Essentials by Hamza Megahed
Cover of the book Cinema 4D R13 Cookbook by Hamza Megahed
Cover of the book Mastering Git by Hamza Megahed
Cover of the book BPEL Cookbook: Best Practices for SOA-based integration and composite applications development by Hamza Megahed
Cover of the book jBPM 5 Developer Guide by Hamza Megahed
Cover of the book INSTANT Mock Testing with PowerMock by Hamza Megahed
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy