Penetration Testing with Shellcode – آموزش آزمون تست نفوذ با شل کد

Penetration Testing with Shellcode – امنیت همیشه یک نگرانی همیشگی برای همه افراد در خصوص برنامه ها، سیستم ها می باشد. هدف اصلی این کتاب، ایجاد مهارت های لازم جلوگیری از سوء استفاده از امنیت پایین، پیدا کردن آسیب پذیری ها و نقاط ضعف و در برگیرنده  Shellcode، Assembly و Metasploit می باشد. کتاب Penetration Testing with Shellcode در خصوص موضوعات مدیریت حافظه و مونتاژ به کامپایل کردن و استخراج Shellcode و استفاده از syscalls و توابع پویا در حافظه را شامل می شود. در این کتاب همچنین تکنیک هایی را برای کامپایل Shellcode 64 بیتی برای لینوکس و ویندوز همراه با ابزار Metasploit Shellcode فرا میگیرید.

لینک دانلود کتاب Penetration Testing with Shellcode

 

دانلود – حجم : 20 مگابايت

رمز فايل: technet24.ir

Book Details
ISBN 139781788473736
Paperback346 pages
Hamza Megahed
Packt Publishing
February 2018

Book Description
Security has always been a major concern for your application, your system, or your environment. This book’s main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with Shellcode, assembly, and Metasploit.

This book will teach you topics ranging from memory management and assembly to compiling and extracting Shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit Shellcode for Linux and Windows along with Metasploit Shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

Penetration Testing with Shellcode

By the end of this book, you will have become an expert in Shellcode and will understand how systems are compromised both at the operating system and network level.

Table of Contents
1: Introduction
2: Lab Setup
3: Assembly Language in Linux
4: Reverse Engineering
5: Creating Shellcode
6: Buffer Overflow Attacks
7: Exploit Development – Part 1
8: Exploit Development – Part 2
9: Real-World Scenarios – Part 1
10: Real-World Scenarios – Part 2
11: Real-World Scenarios – Part 3
12: Detection and Prevention

What You Will Learn
Create an isolated lab to test and inject Shellcodes (Windows and Linux).
Understand both Windows and Linux behavior.
Learn the assembly programming language.
Create Shellcode using assembly and Metasploit.
Detect buffer overflows.
Debug and reverse-engineer using tools such as gdb, edb, and immunity (Windows and Linux).
Exploit development and shellcodes injections (Windows & Linux).
Prevent and protect against buffer overflows and heap corruption.

Authors
Hamza Megahed

Hamza Megahed is a penetration tester, a Linux kernel expert, and a security researcher. He is interested in exploit development and cryptography, with a background in memory management and return-oriented programming. He has written many shellcodes; some of them were published in shell-storm and exploit-db. Also, he has written articles about information security and cryptographic algorithms.

70%
Awesome
  • Design
دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.