Offensive shellcode from scratch get to grips with shellcode countermeasures and discover how to bypass them
Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these can be bypassed Key Features Get up and running with shellcode fundamentals Develop Shellcode for Windows and Linux Under...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing, Limited
[2022]
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009661629106719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and credits
- Contributors
- About the reviewers
- Table of Contents
- Preface
- Section 1: Shellcode
- Chapter 1: The Ins and Outs of Shellcode
- What is shellcode?
- Examples of shellcode
- Shellcode versus a payload
- Breaking down shellcode
- Exploring the common types of shellcode
- Local shellcode
- Remote shellcode
- Summary
- Further reading
- Chapter 2: Assembly Language
- Technical requirements
- Demystifying assembly language
- Types of assembly language
- Identifying the elements of assembly language
- Registers and flags
- Data movement instructions
- Arithmetic instructions
- Conditional instructions
- Summary
- Further reading
- Chapter 3: Shellcode Tools and Resources
- Technical requirements
- Interpreters, compilers, and assemblers
- Interpreters
- Compilers
- Interpreters versus compilers
- Assemblers
- Tools and resources for developing shellcode
- Netwide Assembler (NASM)
- Microsoft Assembler (MASM)
- Visual Studio
- GNU Compiler
- IDA Pro
- x64dbg
- Shellcode creation tools
- Online shellcode resources
- Summary
- Section 2: Writing Shellcode
- Chapter 4: Developing Shellcode for Windows
- Technical requirements
- Environment setup
- Installing Mona
- Anatomy of memory
- Shellcode techniques
- Buffer overflow attacks
- Backdooring PE files with shellcode
- Egg hunter
- Summary
- Further reading
- Chapter 5: Developing Shellcode for Linux
- Technical requirements
- Environment setup
- Executable and Linking Format (ELF) fundamentals
- Shellcode techniques
- Basic Linux shellcode
- Egg hunter shellcode
- Reverse TCP shellcode
- Writing shellcode for x64
- Format string vulnerabilities
- Summary
- Further reading
- Section 3: Countermeasures and Bypasses
- Chapter 6: Countermeasures and Bypasses
- Technical requirements.
- Countermeasures and bypasses for Windows
- Address space layout randomization
- Data execution prevention
- Stack cookies
- Structured exception handling
- Countermeasures and bypasses for Linux
- NoExecute
- Address space layout randomization
- Relocation read only
- Summary
- Further reading
- Index
- Other Books You May Enjoy.