|
Showing 1 - 2 of
2 matches in All Departments
Gain practical knowledge of shellcode and leverage it to develop
shellcode for Windows and Linux operating systems, while
understanding the countermeasures in place and how these can be
bypassed Key Features Get up and running with shellcode
fundamentals Develop Shellcode for Windows and Linux Understand the
building blocks of shellcode Book DescriptionShellcoding is a
technique that is executed by many red teams and used in
penetration testing and real-world attacks. Books on shellcode can
be complex, and writing shellcode is perceived as a kind of "dark
art." Offensive Shellcode from Scratch will help you to build a
strong foundation of shellcode knowledge and enable you to use it
with Linux and Windows. This book helps you to explore simple to
more complex examples of shellcode that are used by real advanced
persistent threat (APT) groups. You'll get to grips with the
components of shellcode and understand which tools are used when
building shellcode, along with the automated tools that exist to
create shellcode payloads. As you advance through the chapters,
you'll become well versed in assembly language and its various
components, such as registers, flags, and data types. This
shellcode book also teaches you about the compilers and decoders
that are used when creating shellcode. Finally, the book takes you
through various attacks that entail the use of shellcode in both
Windows and Linux environments. By the end of this shellcode book,
you'll have gained the knowledge needed to understand the workings
of shellcode and build your own exploits by using the concepts
explored. What you will learn Gain a thorough understanding of
shellcode Get to grips with assembly language and its key purpose
in shellcode development Identify key elements of memory registers
Explore debuggers and their use cases Get up and running with
hands-on shellcode creation for both Windows and Linux Exploit
Windows and Linux operating systems using shellcode Assess
countermeasures of Windows and Linux Who this book is forThis book
is for red teamers, penetration testers, and anyone looking to
learn about shellcode and find out how it is used to break into
systems by making use of simple to complex instructions of code in
memory. Basic shellcode knowledge is helpful but not mandatory to
understand the topics covered in this book.
Get up to speed with various penetration testing techniques and
resolve security threats of varying complexity Key Features Enhance
your penetration testing skills to tackle security threats Learn to
gather information, find vulnerabilities, and exploit enterprise
defenses Navigate secured systems with the most up-to-date version
of Kali Linux (2019.1) and Metasploit (5.0.0) Book
DescriptionSending information via the internet is not entirely
private, as evidenced by the rise in hacking, malware attacks, and
security threats. With the help of this book, you'll learn crucial
penetration testing techniques to help you evaluate enterprise
defenses. You'll start by understanding each stage of pentesting
and deploying target virtual machines, including Linux and Windows.
Next, the book will guide you through performing intermediate
penetration testing in a controlled environment. With the help of
practical use cases, you'll also be able to implement your learning
in real-world scenarios. By studying everything from setting up
your lab, information gathering and password attacks, through to
social engineering and post exploitation, you'll be able to
successfully overcome security threats. The book will even help you
leverage the best tools, such as Kali Linux, Metasploit, Burp
Suite, and other open source pentesting tools to perform these
techniques. Toward the later chapters, you'll focus on best
practices to quickly resolve security threats. By the end of this
book, you'll be well versed with various penetration testing
techniques so as to be able to tackle security threats effectively
What you will learn Perform entry-level penetration tests by
learning various concepts and techniques Understand both common and
not-so-common vulnerabilities from an attacker's perspective Get
familiar with intermediate attack methods that can be used in
real-world scenarios Understand how vulnerabilities are created by
developers and how to fix some of them at source code level Become
well versed with basic tools for ethical hacking purposes Exploit
known vulnerable services with tools such as Metasploit Who this
book is forIf you're just getting started with penetration testing
and want to explore various security domains, this book is for you.
Security professionals, network engineers, and amateur ethical
hackers will also find this book useful. Prior knowledge of
penetration testing and ethical hacking is not necessary.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|