Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind (Cyber Secrets)

$12.99
by Jeremy Martin

Shop Now
In this issue of Cyber Secrets, we are covering the attack and exploitation phase with a ton of examples ranging from vulnerability scans to egg hunter buffer overflows to privilege escalation. The hands on labs are fun and some take some public targets anyone can download and throw a new spin on them to help practice your trade craft. You will also find some interesting tips and tricks that may just help you fill in that one piece you have been looking for.Here is a sample of the subjects: Build a Hacker Toolkit, Dark Market Services, Dark Web Corner, I2P Search Engines, Tor Email / Messaging Services, Industrial Control System Vs. IT, Data Breaches, Introduction to Malware, APT41: Profiling and Tool analysis, NMAP - The Network Mapper, Network Vulnerability Scanning w/ OpenVAS, REXECD Attack Walkthrough, SEH Egghunter Buffer Overflow, Privilege Escalation: A Stairway to Heaven, Digital Steganography: Image, Text, and Network Steganography Walkthroughs This was another fun project to work on.  With such great talent, the content was naturally good.  Some of the team are veterans in their field while a few are just starting out (and have a bright future). Launching Exploits: One Small Vulnerability For A Company, One Giant Heap for Port Bind ABIS BOOK Independently Published

Customer Reviews

No ratings. Be the first to rate

 customer ratings


How are ratings calculated?
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzes reviews to verify trustworthiness.

Review This Product

Share your thoughts with other customers