This is an interim version of our Electronic Legal Deposit Catalogue-eJournals and eBooks while we continue to recover from a cyber-attack.
Penetration testing with shellcode : detect, exploit, and secure network-level and operating system vulnerabilities /: detect, exploit, and secure network-level and operating system vulnerabilities. (2018)
Record Type:
Book
Title:
Penetration testing with shellcode : detect, exploit, and secure network-level and operating system vulnerabilities /: detect, exploit, and secure network-level and operating system vulnerabilities. (2018)
Main Title:
Penetration testing with shellcode : detect, exploit, and secure network-level and operating system vulnerabilities
Table of Contents Introduction Lab Setup Assembly Language in Linux Reverse Engineering Creating Shellcode Buffer Overflow Attacks Exploit Development – Part 1 Exploit Development – Part 2 Real World scenarios part 1 Real World scenarios part 2 Real World scenarios part 3 Detection and Prevention.
Note: Description based on CIP data; resource not viewed.
Access Rights:
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Access Usage:
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.