【文件属性】:
文件名称:Penetration Testing with Shellcode Detect, exploit, and secure network-level
文件大小:20.44MB
文件格式:PDF
更新时间:2021-06-14 07:44:33
渗透测试
Chapter 1, Introduction, discusses the concept of shellcode, buffer overflow, heap corruption, and
introduces the computer architecture.
Chapter 2, Lab Setup, teaches how to build a safe environment to test bad code and introduces
readers to the graphical interfaces of debuggers.
Chapter 3, Assembly Language in Linux, explains how to use the assembly language on Linux to
build shellcode.
Chapter 4, Reverse Engineering, shows how to use debuggers to perform reverse engineering on
code.
Chapter 5, Creating Shellcode, explains how to build a shellcode using the assembly language and
Metasploit.
Chapter 6, Buffer Overflow Attacks, provides a detailed understanding of buffer overflow attacks
on Windows and Linux.
Chapter 7, Exploit Development – Part 1, discusses how to perform fuzzing and finding the return
address.
Chapter 8, Exploit Development – Part 2, teaches how to generate a proper shellcode and how to
inject a shellcode in an exploit.
Chapter 9, Real-World Scenarios – Part 1, introduces a real-world example of buffer overflow
attacks.
Chapter 10, Real-World Scenarios – Part 2, continues the previous chapter but is more advanced.
Chapter 11, Real-World Scenarios – Part 3, gives another real-world scenario example but with
more techniques.
Chapter 12, Detection and Prevention, discusses the techniques and algorithms you need to detect
and prevent buffer overflow attacks.
网友评论
- 这本书很不错