Penetration Testing with Shellcode Detect, exploit, and secure network-level and operating system vulnerabilities
Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing
2018.
|
Colección: | EBSCO Academic eBook Collection.
|
Acceso en línea: | Conectar con la versión electrónica |
Ver en Universidad de Navarra: | https://innopac.unav.es/record=b46081148*spi |
Sumario: | Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-shifting operations; Arithmetic shift operation ; Logical shift; Rotate operation; Summary ; Chapter 4: Reverse Engineering; Debugging in Linux; Debugging in Windows ; Summary; Chapter 5: Creating Shellcode; The basics; Bad characters; The relative address techniqueÂ. Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit. |
---|---|
Descripción Física: | 1 recurso electrónico (336 páginas) |
Formato: | Forma de acceso: World Wide Web. |
ISBN: | 9781788475594 9781788473736 |