Skip to Content
Hacking: The Art of Exploitation, 2nd Edition
book

Hacking: The Art of Exploitation, 2nd Edition

by Jon Erickson
January 2008
Beginner to intermediate
480 pages
12h 58m
English
No Starch Press
Content preview from Hacking: The Art of Exploitation, 2nd Edition

Chapter 0x500. SHELLCODE

So far, the shellcode used in our exploits has been just a string of copied and pasted bytes. We have seen standard shell-spawning shellcode for local exploits and port-binding shellcode for remote ones. Shellcode is also sometimes referred to as an exploit payload, since these self-contained programs do the real work once a program has been hacked. Shellcode usually spawns a shell, as that is an elegant way to hand off control; but it can do anything a program can do.

Unfortunately, for many hackers the shellcode story stops at copying and pasting bytes. These hackers are just scratching the surface of what's possible. Custom shellcode gives you absolute control over the exploited program. Perhaps you want your shellcode ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri
The Complete Ethical Hacking Course

The Complete Ethical Hacking Course

Codestars By Rob Percival, Atil Samancioglu

Publisher Resources

ISBN: 9781593271442Supplemental ContentErrata Page