About the Metasploit Meterpreter, you can find more information at http://www.offensive-security.com/metasploit-unleashed/About_Meterpreter
For Metasploit's Meterpreter, go to https://projetsecubd.googlecode.com/svn-history/r17/trunk/Documents/meterpreter.pdf
For Meterpreter Basics, go to http://www.offensive-security.com/metasploit-unleashed/Meterpreter_Basics
More information on MSFCLI can be obtained at http://www.offensive-security.com/metasploit-unleashed/Msfcli
You can read up the GNU GDB documentation at http://www.gnu.org/software/gdb/documentation/
You can read up the Executable and Linkable Format at http://wiki.osdev.org/ELF
For The ELF Object File Format: Introduction, go to http://www.linuxjournal.com/article/1059
To read up more on DWARF Debugging Information Format revision 2.2.0, go to http://www.dwarfstd.org/doc/dwarf-2.0.0.pdf
For details on the Objdump command reference, go to https://sourceware.org/binutils/docs/binutils/objdump.html#objdump
You can read...
Penetration Testing with the Bash shell
By :
Penetration Testing with the Bash shell
By:
Overview of this book
Table of Contents (13 chapters)
Penetration Testing with the Bash shell
Credits
Disclaimer
About the Author
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting to Know Bash
Customizing Your Shell
Network Reconnaissance
Exploitation and Reverse Engineering
Network Exploitation and Monitoring
Index
Customer Reviews