Gray hat hacking : the ethical hacker's handbook / Shon Harris ... [et al.].

Contributor(s): Harris, ShonMaterial type: TextTextPublisher: New York : McGraw-Hill, c2008Edition: 2nd edDescription: xxiv, 550 p. : ill. ; 24 cmISBN: 9780071495684 (alk. paper); 0071495681 (alk. paper)Subject(s): Computer security | Computer hackersDDC classification: 005.8 LOC classification: QA76.9.A25 | G743 2008Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
Part I. Introduction to ethical disclosure. Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure. Part II. Penetration testing and tools. Using metasploit -- Using the BackTrack LiveCD Linux distribution. Part III. Exploits 101. Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Basic Windows exploits. Part IV. Vulnerability analysis. Passive analysis -- Advanced static analysis with IDA pro -- Advanced reverse engineering -- Client-side browser exploits -- Exploiting Windows access control model for local elevation of privilege -- Intelligent fuzzing with Sulley -- From vulnerability to exploit -- Closing the holes: mitigation. Part V. Malware analysis. Collecting Malware and initial analysis -- Hacking Malware.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Call number Copy number Status Notes Date due Barcode
Books Books Female Library
QA76.9 .A25 G743 2008 (Browse shelf (Opens below)) 1 Available STACKS 51952000175100
Books Books Main Library
QA76.9 .A25 G743 2008 (Browse shelf (Opens below)) 1 Available STACKS 51952000157946

Includes bibliographical references and index.

Part I. Introduction to ethical disclosure. Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure. Part II. Penetration testing and tools. Using metasploit -- Using the BackTrack LiveCD Linux distribution. Part III. Exploits 101. Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Basic Windows exploits. Part IV. Vulnerability analysis. Passive analysis -- Advanced static analysis with IDA pro -- Advanced reverse engineering -- Client-side browser exploits -- Exploiting Windows access control model for local elevation of privilege -- Intelligent fuzzing with Sulley -- From vulnerability to exploit -- Closing the holes: mitigation. Part V. Malware analysis. Collecting Malware and initial analysis -- Hacking Malware.

1 2

There are no comments on this title.

to post a comment.