Penetration Testing with Shellcode

Key FeaturesUnderstand how systems can be bypassed both at the operating system level and network level with Shellcode, assembly, and MetasploitLearn to write and modify 64-bit Shellcode to fit into your exploits along with kernel level Shellcode conceptsA step-by-step guide that will take you from developing low-level security skills to covering loops with Shellcode.Book DescriptionSecurity has always been a major concern, be it your application, your system or your environment. This book's main goal is to build your skills for low-level security to exploit, finding vulnerabilities and covering loop holes with Shellcode, assembly, and Metasploit.This book will teach you topics from memory management and assembly, to compiling and extracting Shellcode, to using syscalls and dynamically locating functions in memory. Next, this book will also cover techniques to compile 64-bit Shellcode for Mac OS X along with Metasploit Shellcode tools for encoding. Lastly, this book will also show you to modify Shellcode to fit into your exploits, write custom Shellcodes, implementing your own egg hunter Shellcode and kernel level Shellcode concepts.By the end of this book, you will have developed expert level Shellcode understanding to find out how systems are compromised both at the operating system level and network level.What you will learnCreate an isolated lab to test and inject Shellcodes (Windows & Linux).Understanding both Windows and Linux behavior in the execution.Learn the concept of assembly programming language.Creating a Shellcode using assembly and Metasploit.Detect buffer overflow and heap corruption.Debugging and reverse engineering using tools like gdb, edb, immunity (Windows & Linux).Exploit development and injections Shellcodes (Windows & Linux).Prevention and protection against buffer overflow and heap corruption.About the AuthorHamza Megahed is a Penetration tester, exploit researcher. Interested in exploit development and cryptography, wrote Shellcodes for shell-storm and exploit-db and exploits for docker container, and also wrote articles about information security and cryptographic algorithms.

Author: Hamza Megahed

Learn more