Cargando…

Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities.

Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Megahed, Hamza
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1024277710
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 180224s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d NLE  |d MERUC  |d CHVBK  |d IDB  |d YDX  |d OCLCQ  |d VT2  |d TEFOD  |d OCLCQ  |d LVT  |d C6I  |d UKAHL  |d UKMGB  |d OCLCQ  |d N$T  |d UX1  |d OCLCF  |d OCLCQ  |d OCLCO 
015 |a GBB838167  |2 bnb 
016 7 |a 018758017  |2 Uk 
019 |a 1026293710  |a 1175635787 
020 |a 9781788475594  |q (electronic bk.) 
020 |a 1788475593  |q (electronic bk.) 
020 |a 1788473736 
020 |a 9781788473736 
024 3 |a 9781788473736 
029 1 |a AU@  |b 000066233849 
029 1 |a CHNEW  |b 000987174 
029 1 |a CHVBK  |b 509400914 
029 1 |a UKMGB  |b 018758017 
029 1 |a DKDLA  |b 820120-katalog:999929982205765 
035 |a (OCoLC)1024277710  |z (OCoLC)1026293710  |z (OCoLC)1175635787 
037 |a B08886  |b 01201872 
037 |a 4E864D6A-1963-495E-93D5-3BDDB5920287  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .M443 2018 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Megahed, Hamza. 
245 1 0 |a Penetration Testing with Shellcode :  |b Detect, exploit, and secure network-level and operating system vulnerabilities. 
260 |a Birmingham :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (336 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What is a stack?; What is a buffer?; What is stack overflow?; What is a heap?; What is heap corruption?; Memory layout; What is shellcode?; Computer architecture; Registers; General purpose registers; Instruction pointer; Segment registers; Endianness; System calls; What are syscalls?; Summary; Chapter 2: Lab Setup; Configuring the attacker machine; Configuring Linux victim machine; Configuring Windows victim machine; Configuring Ubuntu for assembly x86; Networking. 
520 |a Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-shifting operations; Arithmetic shift operation ; Logical shift; Rotate operation; Summary ; Chapter 4: Reverse Engineering; Debugging in Linux; Debugging in Windows ; Summary; Chapter 5: Creating Shellcode; The basics; Bad characters; The relative address technique 
505 8 |a The jmp-call technique The stack technique ; The execve syscall; TCP bind shell; Reverse TCP shell; Generating shellcode using Metasploit; Summary ; Chapter 6: Buffer Overflow Attacks; Stack overflow on Linux; Stack overflow on Windows; Summary; Chapter 7: Exploit Development â#x80;#x93; Part 1; Fuzzing and controlling instruction pointer; Using Metasploit Framework and PEDA; Injecting shellcode; A complete example of buffer overflow; Summary; Chapter 8: Exploit Development â#x80;#x93; Part 2; Injecting shellcode; Return-oriented programming; Structured exception handling; Summary. 
505 8 |a Chapter 9: Real-World Scenarios â#x80;#x93; Part 1Freefloat FTP Server; Fuzzing ; Controlling the instruction pointer; Injecting shellcode ; An example; Summary ; Chapter 10: Real-World Scenarios â#x80;#x93; Part 2; Sync Breeze Enterprise; Fuzzing; Controlling the instruction pointer; Injecting shell code ; Summary ; Chapter 11: Real-World Scenarios â#x80;#x93; Part 3; Easy File Sharing Web Server; Fuzzing ; Controlling SEH; Injecting shellcode ; Summary ; Chapter 12: Detection and Prevention; System approach; Compiler approach ; Developer approach ; Summary; Other Books You May Enjoy; Index. 
520 |a Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Penetration testing. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Megahed, Hamza.  |t Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities.  |d Birmingham : Packt Publishing, ©2018 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1712729  |z Texto completo 
936 |a BATCHLOAD 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33903715 
938 |a EBSCOhost  |b EBSC  |n 1712729 
938 |a YBP Library Services  |b YANK  |n 15164793 
994 |a 92  |b IZTAP