Offensive shellcode from scratch : get to grips with shellcode countermeasures and discover how to bypass them

Book Cover
Average Rating
Published
Birmingham : Packt Publishing, Limited, 2022.
Status
Available Online

Description

Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these can be bypassed Key Features Get up and running with shellcode fundamentals Develop Shellcode for Windows and Linux Understand the building blocks of shellcode Book Description Shellcoding is a technique that is executed by many red teams and used in penetration testing and real-world attacks. Books on shellcode can be complex, and writing shellcode is perceived as a kind of "dark art." Offensive Shellcode from Scratch will help you to build a strong foundation of shellcode knowledge and enable you to use it with Linux and Windows. This book helps you to explore simple to more complex examples of shellcode that are used by real advanced persistent threat (APT) groups. You'll get to grips with the components of shellcode and understand which tools are used when building shellcode, along with the automated tools that exist to create shellcode payloads. As you advance through the chapters, you'll become well versed in assembly language and its various components, such as registers, flags, and data types. This shellcode book also teaches you about the compilers and decoders that are used when creating shellcode. Finally, the book takes you through various attacks that entail the use of shellcode in both Windows and Linux environments. By the end of this shellcode book, you'll have gained the knowledge needed to understand the workings of shellcode and build your own exploits by using the concepts explored. What you will learn Gain a thorough understanding of shellcode Get to grips with assembly language and its key purpose in shellcode development Identify key elements of memory registers Explore debuggers and their use cases Get up and running with hands-on shellcode creation for both Windows and Linux Exploit Windows and Linux operating systems using shellcode Assess countermeasures of Windows and Linux Who this book is for This book is for red teamers, penetration testers, and anyone looking to learn about shellcode and find out how it is used to break into systems by making use of simple to complex instructions of code in memory. Basic shellcode knowledge is helpful but not mandatory to understand the topics covered in this book

More Details

Format
Language
English
ISBN
1803232862, 9781803232867

Notes

Description
Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these can be bypassed Key Features Get up and running with shellcode fundamentals Develop Shellcode for Windows and Linux Understand the building blocks of shellcode Book Description Shellcoding is a technique that is executed by many red teams and used in penetration testing and real-world attacks. Books on shellcode can be complex, and writing shellcode is perceived as a kind of "dark art." Offensive Shellcode from Scratch will help you to build a strong foundation of shellcode knowledge and enable you to use it with Linux and Windows. This book helps you to explore simple to more complex examples of shellcode that are used by real advanced persistent threat (APT) groups. You'll get to grips with the components of shellcode and understand which tools are used when building shellcode, along with the automated tools that exist to create shellcode payloads. As you advance through the chapters, you'll become well versed in assembly language and its various components, such as registers, flags, and data types. This shellcode book also teaches you about the compilers and decoders that are used when creating shellcode. Finally, the book takes you through various attacks that entail the use of shellcode in both Windows and Linux environments. By the end of this shellcode book, you'll have gained the knowledge needed to understand the workings of shellcode and build your own exploits by using the concepts explored. What you will learn Gain a thorough understanding of shellcode Get to grips with assembly language and its key purpose in shellcode development Identify key elements of memory registers Explore debuggers and their use cases Get up and running with hands-on shellcode creation for both Windows and Linux Exploit Windows and Linux operating systems using shellcode Assess countermeasures of Windows and Linux Who this book is for This book is for red teamers, penetration testers, and anyone looking to learn about shellcode and find out how it is used to break into systems by making use of simple to complex instructions of code in memory. Basic shellcode knowledge is helpful but not mandatory to understand the topics covered in this book
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Table of Contents

Cover
Title Page
Copyright and credits
Contributors
About the reviewers
Table of Contents
Preface
Section 1: Shellcode
Chapter 1: The Ins and Outs of Shellcode
What is shellcode?
Examples of shellcode
Shellcode versus a payload
Breaking down shellcode
Exploring the common types of shellcode
Local shellcode
Remote shellcode
Summary
Further reading
Chapter 2: Assembly Language
Technical requirements
Demystifying assembly language
Types of assembly language
Identifying the elements of assembly language
Registers and flags
Data movement instructions
Arithmetic instructions
Conditional instructions
Summary
Further reading
Chapter 3: Shellcode Tools and Resources
Technical requirements
Interpreters, compilers, and assemblers
Interpreters
Compilers
Interpreters versus compilers
Assemblers
Tools and resources for developing shellcode
Netwide Assembler (NASM)
Microsoft Assembler (MASM)
Visual Studio
GNU Compiler
IDA Pro
x64dbg
Shellcode creation tools
Online shellcode resources
Summary
Section 2: Writing Shellcode
Chapter 4: Developing Shellcode for Windows
Technical requirements
Environment setup
Installing Mona
Anatomy of memory
Shellcode techniques
Buffer overflow attacks
Backdooring PE files with shellcode
Egg hunter
Summary
Further reading
Chapter 5: Developing Shellcode for Linux
Technical requirements
Environment setup
Executable and Linking Format (ELF) fundamentals
Shellcode techniques
Basic Linux shellcode
Egg hunter shellcode
Reverse TCP shellcode
Writing shellcode for x64
Format string vulnerabilities
Summary
Further reading
Section 3: Countermeasures and Bypasses
Chapter 6: Countermeasures and Bypasses
Technical requirements
Countermeasures and bypasses for Windows
Address space layout randomization
Data execution prevention
Stack cookies
Structured exception handling
Countermeasures and bypasses for Linux
NoExecute
Address space layout randomization
Relocation read only
Summary
Further reading
Index
Other Books You May Enjoy

Discover More

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Pillay, R. (2022). Offensive shellcode from scratch: get to grips with shellcode countermeasures and discover how to bypass them . Packt Publishing, Limited.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Pillay, Rishalin. 2022. Offensive Shellcode From Scratch: Get to Grips With Shellcode Countermeasures and Discover How to Bypass Them. Birmingham: Packt Publishing, Limited.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Pillay, Rishalin. Offensive Shellcode From Scratch: Get to Grips With Shellcode Countermeasures and Discover How to Bypass Them Birmingham: Packt Publishing, Limited, 2022.

Harvard Citation (style guide)

Pillay, R. (2022). Offensive shellcode from scratch: get to grips with shellcode countermeasures and discover how to bypass them. Birmingham: Packt Publishing, Limited.

MLA Citation, 9th Edition (style guide)

Pillay, Rishalin. Offensive Shellcode From Scratch: Get to Grips With Shellcode Countermeasures and Discover How to Bypass Them Packt Publishing, Limited, 2022.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
3be56c16-1ad9-218e-5a5f-d427533740b2-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID3be56c16-1ad9-218e-5a5f-d427533740b2-eng
Full titleoffensive shellcode from scratch get to grips with shellcode countermeasures and discover how to bypass them
Authorpillay rishalin
Grouping Categorybook
Last Update2025-04-02 03:18:58AM
Last Indexed2025-05-22 03:11:52AM

Book Cover Information

Image Sourcedefault
First LoadedAug 5, 2023
Last UsedMar 27, 2025

Marc Record

First DetectedMar 14, 2023 08:40:15 AM
Last File Modification TimeDec 17, 2024 08:20:52 AM
SuppressedRecord had no items

MARC Record

LEADER06417cam a22004937a 4500
001on1309041761
003OCoLC
00520241217081822.0
006m     o  d        
007cr cnu---unuuu
008220402s2022    enka    o     000 0 eng d
019 |a 1306059305
020 |a 1803232862
020 |a 9781803232867|q (electronic bk.)
035 |a (OCoLC)1309041761|z (OCoLC)1306059305
037 |a 9781803247427|b O'Reilly Media
037 |a 10163389|b IEEE
040 |a EBLCP|b eng|e pn|c EBLCP|d ORMDA|d OCLCO|d OCLCF|d NLW|d OCLCQ|d N$T|d OCLCQ|d UKAHL|d IEEEE|d OCLCO
049 |a MAIN
050 4|a QA76.9.A25
08204|a 005.8|2 23
1001 |a Pillay, Rishalin.
24510|a Offensive shellcode from scratch :|b get to grips with shellcode countermeasures and discover how to bypass them /|c Rishalin Pillay.
260 |a Birmingham :|b Packt Publishing, Limited,|c 2022.
300 |a 1 online resource (209 pages) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
5050 |a Cover -- Title Page -- Copyright and credits -- Contributors -- About the reviewers -- Table of Contents -- Preface -- Section 1: Shellcode -- Chapter 1: The Ins and Outs of Shellcode -- What is shellcode? -- Examples of shellcode -- Shellcode versus a payload -- Breaking down shellcode -- Exploring the common types of shellcode -- Local shellcode -- Remote shellcode -- Summary -- Further reading -- Chapter 2: Assembly Language -- Technical requirements -- Demystifying assembly language -- Types of assembly language -- Identifying the elements of assembly language -- Registers and flags
5058 |a Data movement instructions -- Arithmetic instructions -- Conditional instructions -- Summary -- Further reading -- Chapter 3: Shellcode Tools and Resources -- Technical requirements -- Interpreters, compilers, and assemblers -- Interpreters -- Compilers -- Interpreters versus compilers -- Assemblers -- Tools and resources for developing shellcode -- Netwide Assembler (NASM) -- Microsoft Assembler (MASM) -- Visual Studio -- GNU Compiler -- IDA Pro -- x64dbg -- Shellcode creation tools -- Online shellcode resources -- Summary -- Section 2: Writing Shellcode
5058 |a Chapter 4: Developing Shellcode for Windows -- Technical requirements -- Environment setup -- Installing Mona -- Anatomy of memory -- Shellcode techniques -- Buffer overflow attacks -- Backdooring PE files with shellcode -- Egg hunter -- Summary -- Further reading -- Chapter 5: Developing Shellcode for Linux -- Technical requirements -- Environment setup -- Executable and Linking Format (ELF) fundamentals -- Shellcode techniques -- Basic Linux shellcode -- Egg hunter shellcode -- Reverse TCP shellcode -- Writing shellcode for x64 -- Format string vulnerabilities -- Summary -- Further reading
5058 |a Section 3: Countermeasures and Bypasses -- Chapter 6: Countermeasures and Bypasses -- Technical requirements -- Countermeasures and bypasses for Windows -- Address space layout randomization -- Data execution prevention -- Stack cookies -- Structured exception handling -- Countermeasures and bypasses for Linux -- NoExecute -- Address space layout randomization -- Relocation read only -- Summary -- Further reading -- Index -- Other Books You May Enjoy
520 |a Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these can be bypassed Key Features Get up and running with shellcode fundamentals Develop Shellcode for Windows and Linux Understand the building blocks of shellcode Book Description Shellcoding is a technique that is executed by many red teams and used in penetration testing and real-world attacks. Books on shellcode can be complex, and writing shellcode is perceived as a kind of "dark art." Offensive Shellcode from Scratch will help you to build a strong foundation of shellcode knowledge and enable you to use it with Linux and Windows. This book helps you to explore simple to more complex examples of shellcode that are used by real advanced persistent threat (APT) groups. You'll get to grips with the components of shellcode and understand which tools are used when building shellcode, along with the automated tools that exist to create shellcode payloads. As you advance through the chapters, you'll become well versed in assembly language and its various components, such as registers, flags, and data types. This shellcode book also teaches you about the compilers and decoders that are used when creating shellcode. Finally, the book takes you through various attacks that entail the use of shellcode in both Windows and Linux environments. By the end of this shellcode book, you'll have gained the knowledge needed to understand the workings of shellcode and build your own exploits by using the concepts explored. What you will learn Gain a thorough understanding of shellcode Get to grips with assembly language and its key purpose in shellcode development Identify key elements of memory registers Explore debuggers and their use cases Get up and running with hands-on shellcode creation for both Windows and Linux Exploit Windows and Linux operating systems using shellcode Assess countermeasures of Windows and Linux Who this book is for This book is for red teamers, penetration testers, and anyone looking to learn about shellcode and find out how it is used to break into systems by making use of simple to complex instructions of code in memory. Basic shellcode knowledge is helpful but not mandatory to understand the topics covered in this book
5880 |a Print version record.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer security.|9 65527
650 0|a Programming languages (Electronic computers)|9 52264
77608|i Print version:|a Pillay, Rishalin.|t Offensive Shellcode from Scratch.|d Birmingham : Packt Publishing, Limited, ©2022
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781803247427/?ar|x O'Reilly|z eBook
938 |a ProQuest Ebook Central|b EBLB|n EBL6938268
938 |a EBSCOhost|b EBSC|n 3195699
938 |a Askews and Holts Library Services|b ASKH|n AH39838243
994 |a 92|b VIA
999 |c 282156|d 282156