This title presents the latest strategies for uncovering today's most devastating attacks. Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition" details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. Develop and launch exploits using BackTrack and Metasploit. Employ physical, social engineering, and insider attack techniques. Build Perl, Python, and Ruby scripts that initiate stack buffer overflows. Understand and prevent malicious content in Adobe, Office, and multimedia files. Detect and block client-side, Web server, VoIP, and SCADA attacks. Reverse engineer, fuzz, and decompile Windows and Linux software. Develop SQL injection, cross-site scripting, and forgery exploits. Trap malware and rootkits using honeypots and SandBoxes.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Allen Harper, CISSP, a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC.
Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and a bestselling author. She was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.
Jonathan Ness is a software security engineer at Microsoft. He is a member of an Air National Guard unit where he leads network penetration tests against military facilities across the country and helps define the information warfare aggressor mission for the Air Force.
Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California. A computer engineer/scientist for 25 years, his research interests include computer network attack and defense, computer forensics, and reverse/anti-reverse engineering. He can often be found teaching at Black Hat or spending late nights working on capture the flag at Defcon
Gideon J. Lenkey, CISSP co-founded Ra Security Systems, a network security monitoring and consultancy. He has provided advanced training to the FBI and is the sitting president of the FBI's InfraGard chapter in New Jersey.
Terron Williams, NSA IAM-IEM, CEH, CSSLP, works for Elster Electricity as a Senior Test Engineer with his primary focus on Smart Grid Security. He has served on the editorial board for Hakin9 Magazine.
Part I: Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
Chapter 4 Social Engineering Attacks
Chapter 5 Physical Penetration Attacks
Chapter 6 Insider Attacks
Chapter 7 Using the BackTrack Linux Distribution
Chapter 8 Using Metasploit
Chapter 9 Managing a Penetration Test
Part III: Exploiting
Chapter 10 Programming Survival Skills
Chapter 11 Basic Linux Exploits
Chapter 12 Advanced Linux Exploits
Chapter 13 Shellcode Strategies
Chapter 14 Writing Linux Shellcode
Chapter 15 Windows Exploits
Chapter 16 Understanding and Detecting Content-Type Attacks
Chapter 17 Web Application Security Vulnerabilities
Chapter 18 VoIP Attacks
Chapter 19 SCADA Attacks
Part IV: Vulnerability Analysis
Chapter 20 Passive Analysis
Chapter 21 Advanced Static Analysis with IDA Pro
Chapter 22 Advanced Reverse Engineering
Chapter 23 Client-Side Browser Exploits
Chapter 24 Exploiting the Windows Access Control Model
Chapter 25 Intelligent Fuzzing with Sulley
Chapter 26 From Vulnerability to Exploit
Chapter 27 Closing the Holes: Mitigation
Part V: Malware Analysis
Chapter 28 Collecting Malware and Initial Analysis
Chapter 29 Hacking Malware
Index
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: Zoom Books Company, Lynden, WA, U.S.A.
Condizione: very_good. Book is in very good condition and may include minimal underlining highlighting. The book can also include "From the library of" labels. May not contain miscellaneous items toys, dvds, etc. . We offer 100% money back guarantee and 24 7 customer service. Codice articolo ZBV.0071742557.VG
Quantità: 1 disponibili
Da: Evergreen Goodwill, Seattle, WA, U.S.A.
paperback. Condizione: Good. Codice articolo mon0000345872
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Codice articolo G0071742557I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Codice articolo G0071742557I3N00
Quantità: 1 disponibili
Da: ThriftBooks-Phoenix, Phoenix, AZ, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less. Codice articolo G0071742557I3N00
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Codice articolo G0071742557I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Reno, Reno, NV, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less. Codice articolo G0071742557I4N00
Quantità: 1 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects. Codice articolo 8563074-6
Quantità: 2 disponibili
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Codice articolo 9046290-6
Quantità: 1 disponibili
Da: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Codice articolo S_435339489
Quantità: 1 disponibili