文件名称:Penetration Testing with Shellcode Detect, exploit, and secure network-level
文件大小:20.44MB
文件格式:PDF
更新时间:2021-06-14 07:44:33
渗透测试
Chapter 1, Introduction, discusses the concept of shellcode, buffer overflow, heap corruption, and introduces the computer architecture. Chapter 2, Lab Setup, teaches how to build a safe environment to test bad code and introduces readers to the graphical interfaces of debuggers. Chapter 3, Assembly Language in Linux, explains how to use the assembly language on Linux to build shellcode. Chapter 4, Reverse Engineering, shows how to use debuggers to perform reverse engineering on code. Chapter 5, Creating Shellcode, explains how to build a shellcode using the assembly language and Metasploit. Chapter 6, Buffer Overflow Attacks, provides a detailed understanding of buffer overflow attacks on Windows and Linux. Chapter 7, Exploit Development – Part 1, discusses how to perform fuzzing and finding the return address. Chapter 8, Exploit Development – Part 2, teaches how to generate a proper shellcode and how to inject a shellcode in an exploit. Chapter 9, Real-World Scenarios – Part 1, introduces a real-world example of buffer overflow attacks. Chapter 10, Real-World Scenarios – Part 2, continues the previous chapter but is more advanced. Chapter 11, Real-World Scenarios – Part 3, gives another real-world scenario example but with more techniques. Chapter 12, Detection and Prevention, discusses the techniques and algorithms you need to detect and prevent buffer overflow attacks.