000 02109cam a2200349 a 4500
001 u9003
003 SA-PMU
005 20210418123809.0
008 071120s2008 nyua b 001 0 eng
010 _a 2007047838
040 _aDLC
_beng
_cDLC
_dUKM
_dYOM
_dOCLCF
020 _a9780071495684 (alk. paper)
020 _a0071495681 (alk. paper)
035 _a(OCoLC)182552993
_z(OCoLC)144225844
_z(OCoLC)187292745
050 0 0 _aQA76.9.A25
_bG743 2008
082 0 0 _a005.8
_222
245 0 0 _aGray hat hacking :
_bthe ethical hacker's handbook /
_cShon Harris ... [et al.].
250 _a2nd ed.
260 _aNew York :
_bMcGraw-Hill,
_cc2008.
300 _axxiv, 550 p. :
_bill. ;
_c24 cm.
504 _aIncludes bibliographical references and index.
505 0 _aPart I. Introduction to ethical disclosure. Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure. Part II. Penetration testing and tools. Using metasploit -- Using the BackTrack LiveCD Linux distribution. Part III. Exploits 101. Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Basic Windows exploits. Part IV. Vulnerability analysis. Passive analysis -- Advanced static analysis with IDA pro -- Advanced reverse engineering -- Client-side browser exploits -- Exploiting Windows access control model for local elevation of privilege -- Intelligent fuzzing with Sulley -- From vulnerability to exploit -- Closing the holes: mitigation. Part V. Malware analysis. Collecting Malware and initial analysis -- Hacking Malware.
650 0 _aComputer security.
650 0 _aComputer hackers.
700 1 _aHarris, Shon.
856 4 2 _3Contributor biographical information
_uhttp://catdir.loc.gov/catdir/enhancements/fy0805/2007047838-b.html
856 4 2 _3Publisher description
_uhttp://catdir.loc.gov/catdir/enhancements/fy0805/2007047838-d.html
856 4 1 _3Table of contents only
_uhttp://catdir.loc.gov/catdir/enhancements/fy0805/2007047838-t.html
942 _cBOOK
994 _aZ0
_bSUPMU
596 _a1 2
999 _c4719
_d4719