Hamza Megahed
Format: Ebook
Master Shellcode to leverage the buffer overflow concept
This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.
Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.
Security has always been a major concern for your application, your system, or your environment. This book`s main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.
This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.
By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.
This practical guide helps you understand buffer overflows and how to become creative about creating shellcode, looking inside code and analyzing it, and mastering the injection of shellcode into infected code. At the end of the book, there is a recap with a real-world scenario.
129.00