Gray Hat Hacking The Ethical Hackers Handbook - Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey

Gray Hat Hacking The Ethical Hackers Handbook

Buch | Softcover
720 Seiten
2011 | 3rd edition
McGraw-Hill Professional (Verlag)
978-0-07-174255-9 (ISBN)
46,10 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Fully expanded to cover the latest devious hacking methods, the third edition of this bestselling ethical hacking and security testing book provides in-depth, advanced coverage of vulnerability discovery and reverse engineering.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

Develop and launch exploits using BackTrack and MetasploitEmploy physical, social engineering, and insider attack techniquesBuild Perl, Python, and Ruby scripts that initiate stack buffer overflowsUnderstand and prevent malicious content in Adobe, Office, and multimedia filesDetect and block client-side, Web server, VoIP, and SCADA attacksReverse engineer, fuzz, and decompile Windows and Linux softwareDevelop SQL injection, cross-site scripting, and forgery exploitsTrap malware and rootkits using honeypots and SandBoxes

Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

Part I: Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
Chapter 4 Social Engineering Attacks
Chapter 5 Physical Penetration Attacks
Chapter 6 Insider Attacks
Chapter 7 Using the BackTrack Linux Distribution
Chapter 8 Using Metasploit
Chapter 9 Managing a Penetration Test
Part III: Exploiting
Chapter 10 Programming Survival Skills
Chapter 11 Basic Linux Exploits
Chapter 12 Advanced Linux Exploits
Chapter 13 Shellcode Strategies
Chapter 14 Writing Linux Shellcode
Chapter 15 Windows Exploits
Chapter 16 Understanding and Detecting Content-Type Attacks
Chapter 17 Web Application Security Vulnerabilities
Chapter 18 VoIP Attacks
Chapter 19 SCADA Attacks
Part IV: Vulnerability Analysis
Chapter 20 Passive Analysis
Chapter 21 Advanced Static Analysis with IDA Pro
Chapter 22 Advanced Reverse Engineering
Chapter 23 Client-Side Browser Exploits
Chapter 24 Exploiting the Windows Access Control Model
Chapter 25 Intelligent Fuzzing with Sulley
Chapter 26 From Vulnerability to Exploit
Chapter 27 Closing the Holes: Mitigation
Part V: Malware Analysis
Chapter 28 Collecting Malware and Initial Analysis
Chapter 29 Hacking Malware
Index

Erscheint lt. Verlag 16.3.2011
Sprache englisch
Maße 183 x 239 mm
Gewicht 1139 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 0-07-174255-7 / 0071742557
ISBN-13 978-0-07-174255-9 / 9780071742559
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich