Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].
Material type:
Item type | Current library | Call number | Copy number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Female Library | QA76.9 .A25 G743 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000175100 | |
![]() |
Main Library | QA76.9 .A25 G743 2008 (Browse shelf (Opens below)) | 1 | Available | STACKS | 51952000157946 |
Includes bibliographical references and index.
Part I. Introduction to ethical disclosure. Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure. Part II. Penetration testing and tools. Using metasploit -- Using the BackTrack LiveCD Linux distribution. Part III. Exploits 101. Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Basic Windows exploits. Part IV. Vulnerability analysis. Passive analysis -- Advanced static analysis with IDA pro -- Advanced reverse engineering -- Client-side browser exploits -- Exploiting Windows access control model for local elevation of privilege -- Intelligent fuzzing with Sulley -- From vulnerability to exploit -- Closing the holes: mitigation. Part V. Malware analysis. Collecting Malware and initial analysis -- Hacking Malware.
1 2
There are no comments on this title.