Writing Security Tools and Exploits
CyberSecurity Summary - En podcast af CyberSecurity Summary

Kategorier:
This Book excerpt on writing security exploits and tools. It covers various software vulnerabilities, such as buffer overflows (stack and heap), format string vulnerabilities, and integer bugs. The text explains exploit development techniques, including shellcode creation and manipulation, and provides examples using assembly language and C. Additionally, it explores using Metasploit and Nessus, two security frameworks, to build and manage exploits, along with extending their capabilities through custom modules and scripts. Finally, it details how to extend Ethereal to support new file formats and protocols.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cyber_security_summaryGet the Book now from Amazon:https://www.amazon.com/Writing-Security-Tools-Exploits-Foster/dp/1597499978?&linkCode=ll1&tag=cvthunderx-20&linkId=9b4e939ddd8e5d0384036a5e5d31a6ec&language=en_US&ref_=as_li_ss_tl