|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1024277710 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
180224s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d NLE
|d MERUC
|d CHVBK
|d IDB
|d YDX
|d OCLCQ
|d VT2
|d TEFOD
|d OCLCQ
|d LVT
|d C6I
|d UKAHL
|d UKMGB
|d OCLCQ
|d N$T
|d UX1
|d OCLCF
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB838167
|2 bnb
|
016 |
7 |
|
|a 018758017
|2 Uk
|
019 |
|
|
|a 1026293710
|a 1175635787
|
020 |
|
|
|a 9781788475594
|q (electronic bk.)
|
020 |
|
|
|a 1788475593
|q (electronic bk.)
|
020 |
|
|
|a 1788473736
|
020 |
|
|
|a 9781788473736
|
024 |
3 |
|
|a 9781788473736
|
029 |
1 |
|
|a AU@
|b 000066233849
|
029 |
1 |
|
|a CHNEW
|b 000987174
|
029 |
1 |
|
|a CHVBK
|b 509400914
|
029 |
1 |
|
|a UKMGB
|b 018758017
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999929982205765
|
035 |
|
|
|a (OCoLC)1024277710
|z (OCoLC)1026293710
|z (OCoLC)1175635787
|
037 |
|
|
|a B08886
|b 01201872
|
037 |
|
|
|a 4E864D6A-1963-495E-93D5-3BDDB5920287
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b .M443 2018
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Megahed, Hamza.
|
245 |
1 |
0 |
|a Penetration Testing with Shellcode :
|b Detect, exploit, and secure network-level and operating system vulnerabilities.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (336 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Introduction; What is a stack?; What is a buffer?; What is stack overflow?; What is a heap?; What is heap corruption?; Memory layout; What is shellcode?; Computer architecture; Registers; General purpose registers; Instruction pointer; Segment registers; Endianness; System calls; What are syscalls?; Summary; Chapter 2: Lab Setup; Configuring the attacker machine; Configuring Linux victim machine; Configuring Windows victim machine; Configuring Ubuntu for assembly x86; Networking.
|
520 |
|
|
|a Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-shifting operations; Arithmetic shift operation ; Logical shift; Rotate operation; Summary ; Chapter 4: Reverse Engineering; Debugging in Linux; Debugging in Windows ; Summary; Chapter 5: Creating Shellcode; The basics; Bad characters; The relative address techniqueÂ
|
505 |
8 |
|
|a The jmp-call technique The stack technique ; The execve syscall; TCP bind shell; Reverse TCP shell; Generating shellcode using Metasploit; Summary ; Chapter 6: Buffer Overflow Attacks; Stack overflow on Linux; Stack overflow on Windows; Summary; Chapter 7: Exploit Development â#x80;#x93; Part 1; Fuzzing and controlling instruction pointer; Using Metasploit Framework and PEDA; Injecting shellcode; A complete example of buffer overflow; Summary; Chapter 8: Exploit Development â#x80;#x93; Part 2; Injecting shellcode; Return-oriented programming; Structured exception handling; Summary.
|
505 |
8 |
|
|a Chapter 9: Real-World Scenarios â#x80;#x93; Part 1Freefloat FTP Server; Fuzzing ; Controlling the instruction pointer; Injecting shellcode ; An example; Summary ; Chapter 10: Real-World Scenarios â#x80;#x93; Part 2; Sync Breeze Enterprise; Fuzzing; Controlling the instruction pointer; Injecting shell code ; Summary ; Chapter 11: Real-World Scenarios â#x80;#x93; Part 3; Easy File Sharing Web Server; Fuzzing ; Controlling SEH; Injecting shellcode ; Summary ; Chapter 12: Detection and Prevention; System approach; Compiler approach ; Developer approach ; Summary; Other Books You May Enjoy; Index.
|
520 |
|
|
|a Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Penetration testing.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Megahed, Hamza.
|t Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities.
|d Birmingham : Packt Publishing, ©2018
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1712729
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33903715
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1712729
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15164793
|
994 |
|
|
|a 92
|b IZTAP
|