Penetration Testing with Shellcode : Detect, exploit, and secure network-level and operating system vulnerabilities.
Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-...
Cote: | Libro Electrónico |
---|---|
Auteur principal: | Megahed, Hamza |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
Birmingham :
Packt Publishing,
2018.
|
Sujets: | |
Accès en ligne: | Texto completo |
Documents similaires
-
Advanced penetration testing : hacking the world's most secure networks /
par: Allsopp, Wil
Publié: (2017) -
Coding for penetration testers : building better tools /
par: Andress, Jason, et autres
Publié: (2016) -
Hands-on application penetration testing with Burp Suite : use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications /
par: Lozano, Carlos A., et autres
Publié: (2019) -
Hands-On Application Penetration Testing with Burp Suite : Use Burp Suite and Its Features to Inspect, Detect, and Exploit Security Vulnerabilities in Your Web Applications.
par: Lozano, Carlos A.
Publié: (2019) -
Mastering Kali Linux for advanced penetration testing : a practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers /
par: Beggs, Robert W.
Publié: (2014)