Gray hat hacking : the ethical hacker's handbook
β Scribed by Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2011
- Tongue
- English
- Leaves
- 713
- Edition
- 3rd ed
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
- Develop and launch exploits using BackTrack and Metasploit
- Employ physical, social engineering, and insider attack techniques
- Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
- Understand and prevent malicious content in Adobe, Office, and multimedia files
- Detect and block client-side, Web server, VoIP, and SCADA attacks
- Reverse engineer, fuzz, and decompile Windows and Linux software
- Develop SQL injection, cross-site scripting, and forgery exploits
- Trap malware and rootkits using honeypots and SandBoxes
β¦ Table of Contents
Content: pt. 1. Introduction to ethical disclosure --
pt. 2. Penetration testing and tools --
pt. 3. Exploiting --
pt. 4. Vulnerability analysis --
pt. 5. Malware analysis.
β¦ Subjects
Computer security.;Hackers.;COMPUTERS -- Internet -- Security.;COMPUTERS -- Networking -- Security.;COMPUTERS -- Security -- General.
π SIMILAR VOLUMES
About the Author **Allen Harper, CISSP,** a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC.
<p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span></span>authenticity, or access to any online entitlements included with the product.</b></p><p><b><br></b></p><p><b>Cutting-edge techniques for finding and fixing critical secur
Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors a
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hackerβs Handbook, Fifth Edition explains the enemyβs current weapons, skills, and tactics and offers field-teste