Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (eBook)

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
By:Eagle, Chris; Williams, Terron; Ness, Jonathan; Lenkey, Gideon; Harris, Shon; Harper, Allen;
Pub Date:February 5th 2011
Format:Electronic book text 720 pages
ISBN:0071742565 / 9780071742566
Your Price:$60.00 ADD TO CART
More Information




Main description

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

  • Develop and launch exploits using BackTrack and Metasploit
  • Employ physical, social engineering, and insider attack techniques
  • Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
  • Understand and prevent malicious content in Adobe, Office, and multimedia files
  • Detect and block client-side, Web server, VoIP, and SCADA attacks
  • Reverse engineer, fuzz, and decompile Windows and Linux software
  • Develop SQL injection, cross-site scripting, and forgery exploits
  • Trap malware and rootkits using honeypots and SandBoxes


Table of contents

Part I: Introduction to Ethical Disclosure
1 Ethics of Ethical Hacking
2 Ethical Hacking and the Legal System
3 Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
4 Social Engineering Attacks
5 Physical Attacks
6 Insider Attacks
7 Using BackTrack LiveCD Linux Distribution
8 Using Metasploit
9 Dradis and Managing a Pen Test
Part III: Exploiting
10 Progamming SProgrammingills
11 Basic Linux Exploits
12 Advanced Linux Exploits
13 Shellcode Strategies
14 Writing Linux Shell Code
15 Basic Windows Exploits
16 Client Content Based Attacks
17 Web Server Attacks
18 VoIP Attacks
19 SCADA Attacks
Part IV: Vulnerability Analysis
20 Passive Analysis
21 Advanced Static Analysis with IDA Pro
22 Advanced Reverse Engineering
23 Client-Side Browser Exploits
24 Exploiting Windows Access Control Model
25 Intelligent Fuzzing with Sulley
26 From Vulnerability to Exploit
27 Closing the Holes: Mitigation Techniques
Part V: Malware Analysis
28 Collecting Malware and Initial Analysis
29 Hacking Malware


Backcover

Author Information

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Apr 25th, 2016
Your Price: $85.00
Owl Image

Date: Mar 4th, 2016
Your Price: $60.00
Owl Image

Date: Dec 29th, 2015
Your Price: $99.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $95.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $70.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Sep 17th, 2015
Your Price: $50.00
Owl Image

Date: Sep 5th, 2015
Your Price: $65.00
Owl Image

Date: Aug 13th, 2015
Your Price: $65.00
Owl Image

Date: Aug 10th, 2015
Your Price: $60.00
Owl Image

Date: Aug 3rd, 2015
Your Price: $50.00
Owl Image

Date: Jul 30th, 2015
Your Price: $60.00
Owl Image

Date: Jul 30th, 2015
Your Price: $50.00
Owl Image

Date: Jun 5th, 2015
Your Price: $50.00