Аннотация
This book is all about finding buffer overflow vulnerabilities, crafting your own shellcode from scratch, learning the security mechanisms of the operating system, and exploit development. You will understand how systems can be bypassed both at the operating system and network levels with shellcode, assembly, and Metasploit. You will also learn to write and modify 64-bit shellcode along with kernel-level shellcode concepts. Overall, this book is a step-by-step guide that will take you from low-level security skills to covering loops with exploit development and shellcode.


![Оглавление
Статьи
CG Event 2010: стереоприятие Автор: Юрий Ильин
Метаигры: что скрывается под вторым дном искусственных миров Автор: Андрей Письменный
... Цифровой журнал «Компьютерра» № 47 [13.12.2010 — 19.12.2010]](https://www.rulit.me/kotha/images/nocover.jpg)






Комментарии к книге "Penetration Testing with Shellcode"