Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities (使用 Shellcode 的滲透測試:檢測、利用與保護網路層級及作業系統漏洞)

Hamza Megahed

  • 出版商: Packt Publishing
  • 出版日期: 2018-02-15
  • 售價: $1,380
  • 貴賓價: 9.5$1,311
  • 語言: 英文
  • 頁數: 346
  • 裝訂: Paperback
  • ISBN: 1788473736
  • ISBN-13: 9781788473736
  • 相關分類: Penetration-test
  • 立即出貨 (庫存=1)

買這商品的人也買了...

相關主題

商品描述

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts
  • A step-by-step guide that will take you from low-level security skills to covering loops with shellcode

Book Description

Security has always been a major concern for your application, your system, or your environment. This book's main goal is to build your skills for low-level security exploits, finding vulnerabilities and covering loopholes with shellcode, assembly, and Metasploit.

This book will teach you topics ranging from memory management and assembly to compiling and extracting shellcode and using syscalls and dynamically locating functions in memory. This book also covers techniques to compile 64-bit shellcode for Linux and Windows along with Metasploit shellcode tools. Lastly, this book will also show you to how to write your own exploits with intermediate techniques, using real-world scenarios.

By the end of this book, you will have become an expert in shellcode and will understand how systems are compromised both at the operating system and network level.

What you will learn

  • Create an isolated lab to test and inject shellcodes (Windows and Linux).
  • Understand both Windows and Linux behavior.
  • Learn the assembly programming language.
  • Create shellcode using assembly and Metasploit.
  • Detect buffer overflows.
  • Debug and reverse-engineer using tools such as GDB, edb, and Immunity (Windows and Linux).
  • Exploit development and shellcodes injections (Windows & Linux).
  • Prevent and protect against buffer overflows and heap corruption.

Who This Book Is For

This book is intended to be read by penetration testers, malware analysts, security researchers, forensic practitioners, exploit developers, C language programmers, software testers, and students in the security field.

Readers should have a basic understanding of OS internals (Windows and Linux). Some knowledge of the C programming language is essential, and a familiarity with the Python language would be helpful.

Table of Contents

  1. Introduction
  2. Lab Setup
  3. Assembly Language in Linux
  4. Reverse Engineering
  5. Creating Shellcode
  6. Buffer Overflow Attacks
  7. Exploit Development - Part 1
  8. Exploit Development - Part 2
  9. Real World scenarios part 1
  10. Real World scenarios part 2
  11. Real World scenarios part 3
  12. Detection and Prevention

商品描述(中文翻譯)

掌握 Shellcode 以利用緩衝區溢位概念

主要特點:
- 了解如何使用 shellcode、組合語言和 Metasploit 繞過作業系統和網路層的系統
- 學習編寫和修改 64 位元 shellcode,以及核心層級的 shellcode 概念
- 逐步指南,從低階安全技能到使用 shellcode 覆蓋迴圈

書籍描述:
安全一直是您的應用程式、系統或環境的主要關注點。本書的主要目標是建立您的低階安全漏洞利用技能,使用 shellcode、組合語言和 Metasploit 找到漏洞並覆蓋漏洞。

本書將教授您從記憶體管理和組合語言到編譯和提取 shellcode,以及使用系統調用和動態定位記憶體中的函數的技術。本書還介紹了編譯 Linux 和 Windows 的 64 位元 shellcode 的技巧,以及 Metasploit shellcode 工具。最後,本書還將向您展示如何使用中級技術編寫自己的漏洞利用,並使用真實世界的情境。

通過閱讀本書,您將成為 shellcode 的專家,並了解作業系統和網路層如何被入侵。

您將學到:
- 建立一個隔離的實驗室來測試和注入 shellcode(Windows 和 Linux)。
- 了解 Windows 和 Linux 的行為。
- 學習組合語言程式語言。
- 使用組合語言和 Metasploit 創建 shellcode。
- 檢測緩衝區溢位。
- 使用 GDB、edb 和 Immunity(Windows 和 Linux)等工具進行調試和逆向工程。
- 開發漏洞利用和注入 shellcode(Windows 和 Linux)。
- 預防和保護緩衝區溢位和堆破壞。

本書適合對象:
本書適合滲透測試人員、惡意軟體分析師、安全研究人員、法醫實踐者、漏洞開發人員、C 語言程式設計師、軟體測試人員以及安全領域的學生閱讀。

讀者應具備基本的作業系統內部知識(Windows 和 Linux)。對 C 程式語言的基本了解是必要的,對 Python 語言的熟悉將有所幫助。

目錄:
1. 簡介
2. 實驗室設置
3. Linux 中的組合語言
4. 逆向工程
5. 創建 Shellcode
6. 緩衝區溢位攻擊
7. 漏洞開發 - 第一部分
8. 漏洞開發 - 第二部分
9. 真實世界情境 - 第一部分
10. 真實世界情境 - 第二部分
11. 真實世界情境 - 第三部分
12. 檢測和預防