This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), format string vulnerabilities, and integer bugs. The text explains exploit development techniques, including shellcode creation and manipulation, and provides examples using assembly language and C. Additionally, it explores using Metasploit and Nessus, two security frameworks, to build and manage exploits, along with extending their capabilities through custom modules and scripts. Finally, it details how to extend Ethereal to support new file formats and protocols.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Writing-Security-Tools-Exploits-Foster/dp/1597499978?&linkCode=ll1&tag=cvthunderx-20&linkId=9b4e939ddd8e5d0384036a5e5d31a6ec&language=en_US&ref_=as_li_ss_tl
Published on 1 month, 3 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate