Jon's Ethical Hacking Blog

Wednesday, February 20, 2013

Shellcode

Below are a couple of resources listed regarding shellcode:

  • http://linuxdevcenter.com/pub/a/linux/2006/05/18/how-shellcodes-work.html
  • http://www.vividmachines.com/shellcode/shellcode.html


Posted by Unknown at 11:39 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Blog Archive

  • ▼  2013 (32)
    • ►  April (9)
    • ►  March (6)
    • ▼  February (11)
      • Countermeasures - Intrusion Detection
      • Countermeasures - VPNs
      • Countermeasures - Firewalls
      • Countermeasures
      • Shellcode
      • Denial of Service Attack
      • Sockets
      • The OSI Model
      • Another Buffer Overflow Example
      • Format String Vulnerability
      • Buffer Overflows
    • ►  January (6)

Contributors

  • Dr. P
  • Unknown
Awesome Inc. theme. Powered by Blogger.