Login       My Wishlist
  My Cart
$0.00 / 0 items
 
EMS Linux
Utilizing the Best Tools With Linux
 
International Access
Global Shipping Options Available
Home About Us News Our Blog Our Catalog My Cart My Account Track Shippment Contact Us
  Our Catalog   APIs & Operating Environments

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities


Free Shipping Included! Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities by Packt Publishing - ebooks Account at EMS Linux. Hurry! Limited time offer. Offer valid only while supplies last. Master Shellcode to leverage the buffer overflow conceptKey FeaturesUnderstand how systems can be bypassed both at the operating system and network


Product Description

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
  • A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.

This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.

What you will learn

  • Create an isolated lab to test and inject shellcodes (Windows and Linux).
  • Understand both Windows and Linux behavior.
  • Learn the assembly programming language.
  • Create shellcode using assembly and Metasploit.
  • Detect buffer overflows.
  • Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux).
  • Exploit development and shellcodes injections (Windows & Linux).
  • Prevent and protect against buffer overflows and heap corruption.

Who This Book Is For

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

Table of Contents

  1. Introduction
  2. Lab Setup
  3. Assembly Language in Linux
  4. Reverse Engineering
  5. Creating Shellcode
  6. Buffer Overflow Attacks
  7. Exploit Development - Part 1
  8. Exploit Development - Part 2
  9. Real World scenarios part 1
  10. Real World scenarios part 2
  11. Real World scenarios part 3
  12. Detection and Prevention

Additional Information

Manufacturer:Packt Publishing - ebooks Account
Publisher:Packt Publishing - ebooks Account
Studio:Packt Publishing - ebooks Account
EAN:9781788473736
Item Size:0.78 x 9.25 x 9.25 inches
Package Weight:1.65 pounds
Package Size:7.5 x 0.78 x 0.78 inches

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities by Packt Publishing - ebooks Account

Buy Now:
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Brand: Packt Publishing - ebooks Account
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$39.99


Quantity:  

 


 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Packt Publishing - ebooks Account, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Last:
Email Address:
Your Message:

Related Best Sellers


ean: 9781547000760, isbn: 1547000767,
Do You Want To Master The Linux Operating System? Would You Like To Start Leveraging The Command Line System Fast and Easily?Yes, if you've ever dabbled with Linux, even if you have no programming experience, then this book will provide the basis and...

mpn: 65 colour illustrations, ean: 9781498712439, isbn: 1498712436,
An Update of the Most Practical A-to-Z Operating System Book Widely lauded for avoiding the typical black box approach found in other operating system textbooks, the first edition of this bestselling book taught readers how an operating system works...

ean: 9781484234044, isbn: 1484234049,
Learn how to get started with robotics programming using Robot Operation System (ROS). Targeted for absolute beginners in ROS, Linux, and Python, this short guide shows you how to build your own robotics projects.ROS is an open-source and flexible fr...

mpn: 9781680451832, ean: 9781680451832, isbn: 1680451839,
Linux is a powerful open-source operating system that has been around for many years and is widely used for running servers and websites. But most students and Makers encounter it for the first time when they are working on projects with their Raspbe...

ean: 9781533683731, isbn: 1533683735,
Learn The Linux Operating System and Command Line Today With This Step-By-Step Guide!- Linux Ultimate Beginner’s Guide 2017Updated & Improved: February 2018Do you want to learn the Linux Operating System and Command Line? Do you want a guide that i...

ean: 9780470128725, isbn: 0470128720,
Keep pace with the fast-developing world of operating systems Open-source operating systems, virtual machines, and clustered computing are among the leading fields of operating systems and networking that are rapidly changing. With substantial revisi...

ean: 9780134900124, isbn: 013490012X,
An introductory tutorial or class text and a reference for experienced programmers. Revised from the 1990 edition by using ANSI C for all examples, expanding and rearranging much of the material, dropping the explanation of UNIX, describing the Posix...

ean: 9781942270041, isbn: 1942270046,
This book is intended to provide a senior undergraduate or graduate student in electrical engineering or computer science with a balance of fundamental theory, review of industry practice, and hands-on experience to prepare for a career in the real-t...

ean: 9780130810816, isbn: 0130810819,
Well-implemented interprocess communications (IPC) are key to the performance of virtually every non-trivial UNIX program. In UNIX Network Programming, Volume 2, Second Edition, legendary UNIX expert W. Richard Stevens presents a comprehensive guide ...

ean: 9781565926219, isbn: 1565926218,
Python is growing in popularity; based on download statistics, there are now over 450,000 people using Python, and more than 150,000 people using Python on Windows. Use of the language has been growing at about 40% per year since 1995, and there is e...



Privacy Policy / Terms of Service
© 2018 - emslinux.com. All Rights Reserved.