Unavailable
Unavailable
Unavailable
Ebook206 pages59 minutes
Deep Dive: The Development of an Exploit: (Win32)
By Manu Carus
Rating: 5 out of 5 stars
5/5
()
Currently unavailable
Currently unavailable
About this ebook
Cyber crime is on everyone's lips. It's in the daily news, and every week society gets overwhelmed with information about hacking attacks, industrial espionage, unavailable IT services, and imprisonment of IT criminals. Not least the NSA affair has widely contributed to the "popularity" of headlines about spying out other nations' administrations, companies and citizens.
But scarcely anybody understands what a hacker is doing at all. What the heck is hacking actually?
This book is a story about exploit development. It demonstrates how a hacker exploits a browser vulnerability, step-by-step.
Starting with the crash time analysis of a vulnerable program, the author develops an exploit and shows blow-by-blow how a hacker thinks; what problems come up, and how an attacker can bypass the security protection mechanisms of the operating system.
This book is highly technical! The reader is required to have a slightly perverse inclination to read debug messages, memory addresses and assembler instructions.
If you're interested in hacking, you will get a quite good understanding about what hacking is in practice.
If you're a newbie to Win32 hacking, roll up your sleeves and become a hacker! Learn about shellcode, and how to bypass ASLR and DEP!
If you're part of the InfoSec community, have a good reading. This is no theory, this is deep dive!
But scarcely anybody understands what a hacker is doing at all. What the heck is hacking actually?
This book is a story about exploit development. It demonstrates how a hacker exploits a browser vulnerability, step-by-step.
Starting with the crash time analysis of a vulnerable program, the author develops an exploit and shows blow-by-blow how a hacker thinks; what problems come up, and how an attacker can bypass the security protection mechanisms of the operating system.
This book is highly technical! The reader is required to have a slightly perverse inclination to read debug messages, memory addresses and assembler instructions.
If you're interested in hacking, you will get a quite good understanding about what hacking is in practice.
If you're a newbie to Win32 hacking, roll up your sleeves and become a hacker! Learn about shellcode, and how to bypass ASLR and DEP!
If you're part of the InfoSec community, have a good reading. This is no theory, this is deep dive!
Unavailable
Author
Manu Carus
Manu Carus is IT security professional, ethical hacker, IT auditor, and forensics investigator, working for many years in the InfoSec field (CISSP, CISM, CISA, CEH, E|CSA, CHFI). His passion is X-raying the dark side of the Internet, having fun on analyzing and implementing smart code.
Related to Deep Dive
Related ebooks
The Browser Hacker's Handbook Rating: 0 out of 5 stars0 ratingsCompsec: For the Home User Rating: 0 out of 5 stars0 ratingsCyber Security for Beginners: How to Become a Cybersecurity Professional Without a Technical Background (2022 Guide for Newbies) Rating: 0 out of 5 stars0 ratingsHacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsDefense and Deception: Confuse and Frustrate the Hackers Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing: Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsEthical Hacking: How to Protect Your Network from Cyberattacks Rating: 0 out of 5 stars0 ratingsMalware Analysis and Detection Engineering: A Comprehensive Approach to Detect and Analyze Modern Malware Rating: 0 out of 5 stars0 ratingsUltimate Ethical Hacking Boot Camp Beginner to Pro Rating: 0 out of 5 stars0 ratingsHack Computer System For Noobee Rating: 1 out of 5 stars1/5Ransomware Revealed: A Beginner’s Guide to Protecting and Recovering from Ransomware Attacks Rating: 0 out of 5 stars0 ratingsUltimate Penetration Testing with Nmap Rating: 0 out of 5 stars0 ratingsUltimate Penetration Testing with Nmap: Master Cybersecurity Assessments for Network Security, Monitoring, and Scanning Using Nmap Rating: 0 out of 5 stars0 ratingsUltimate Hacking Challenge: Hacking the Planet, #3 Rating: 5 out of 5 stars5/5CompTIA Security +: Malware and Malware Infections Rating: 0 out of 5 stars0 ratingsBecome An Ethical Hacker That Can Hack Computer Systems And Secure Them Like Security Experts Rating: 0 out of 5 stars0 ratingsHow To Protect Yourself From Adware And Spyware Rating: 5 out of 5 stars5/5Cyber Operations: Building, Defending, and Attacking Modern Computer Networks Rating: 4 out of 5 stars4/5The Core of Hacking Rating: 0 out of 5 stars0 ratingsHackercool Sept 2016: 0, #0 Rating: 5 out of 5 stars5/5Malware Reverse Engineering: Cracking The Code Rating: 0 out of 5 stars0 ratingsHackerTools Crack With Disassembling Rating: 2 out of 5 stars2/5A Convenient Guide to Starting You on Threat Modeling Rating: 0 out of 5 stars0 ratingsJump Start PHP Environment: Master the World's Most Popular Language Rating: 0 out of 5 stars0 ratingsUnderstanding Network Hacks: Attack and Defense with Python Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsBreaking Ransomware: Explore ways to find and exploit flaws in a ransomware attack (English Edition) Rating: 0 out of 5 stars0 ratingsComputer Virus: The Damaging Facts About Computer Viruses! Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar: A Step by Step Process for Breaking into a BANK Rating: 5 out of 5 stars5/5
Reviews for Deep Dive
Rating: 5 out of 5 stars
5/5
2 ratings1 review
- Rating: 5 out of 5 stars5/5I recommend this book to anyone who is interested in Exploit Development. The author has explained advance concepts in a very simpler manner and kills 2 birds with one stone by choosing a browser-exploit in a more recent version of Windows.. (Windows 7).