Penetration Testing with Shellcode Detect, exploit, and secure network-level and operating system vulnerabilities

Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-...

Descripción completa

Detalles Bibliográficos
Autor principal: Megahed, Hamza (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham : Packt Publishing 2018.
Colección:EBSCO Academic eBook Collection.
Acceso en línea:Conectar con la versión electrónica
Ver en Universidad de Navarra:https://innopac.unav.es/record=b46081148*spi
Descripción
Sumario:Chapter 3: Assembly Language in Linux; Assembly language code structure; Data types; Hello world; Stack; Data manipulation; The mov instruction ; Data swapping; Load effective address; Arithmetic operations; Loops; Controlling the flow; Procedures; Logical operations ; Bitwise operations; Bit-shifting operations; Arithmetic shift operation ; Logical shift; Rotate operation; Summary ; Chapter 4: Reverse Engineering; Debugging in Linux; Debugging in Windows ; Summary; Chapter 5: Creating Shellcode; The basics; Bad characters; The relative address techniqueÂ.
Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.
Descripción Física:1 recurso electrónico (336 páginas)
Formato:Forma de acceso: World Wide Web.
ISBN:9781788475594
9781788473736