Penetration Testing with Shellcode will teach you topics ranging from memory management and assembly to compiling and extracting Shellcode and using syscalls and dynamically locating functions in memory. (Limited-time offer)
Table of Contents
- Introduction
- Lab Setup
- Assembly Language in Linux
- Reverse Engineering
- Creating Shellcode
- Buffer Overflow Attacks
- Exploit Development – Part 1
- Exploit Development – Part 2
- Real-World Scenarios – Part 1
- Real-World Scenarios – Part 2
- Real-World Scenarios – Part 3
- Detection and Prevention
Download Free PDF / Read Online
Author(s): Hamza Megahed
Publisher: Packt Publishing
Published: February 2018
Format(s): Online
File size: –
Number of pages: 346
Download / View Link(s): This offer has ended.
Free as of 01/26/2022.
Publisher: Packt Publishing
Published: February 2018
Format(s): Online
File size: –
Number of pages: 346
Download / View Link(s): This offer has ended.
Free as of 01/26/2022.