Gray Hat Hacking The Ethical Hackers Handbook 3/E

Have a Promotion Code?

Please enter it here:

Great deals and more!

Sign up for special offers, exclusive discounts, and new product announcements from McGraw-Hill Professional.

SIGN UP TODAY


Date

January 15, 2011

Format

Electronic book text, 720 pages

ISBN

0071742565 / 9780071742566

Adobe Digital Editions® is required to view your downloaded eBooks.
Click here to get Adobe Digital Editions
To learn more about eBooks please see our eBook FAQ.


If you're having problems installing due to firewall issues please go here:
http://kb2.adobe.com/cps/403/kb403051.html

$

Your Price

60.00



Overview


Main description

Fully updated expanded to cover the latest devious hacking methods

Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current issues, threats, tools and techniques.

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.

Gray Hat Hacking, Third Edition features eight new chapters, covering:

  • Social engineering
  • Physical attacks
  • Insider attacks
  • VoIP attacks
  • SCADA attacks
  • Dradis framework and information sharing
  • Client content-based attacks
  • Web server attacks

Detailed, authoritative coverage Introduction to Ethical Disclosure; Ethics of Ethical Hacking; Ethical Hacking and the Legal System; Proper and Ethical Disclosure; Penetration Testing and Tools; Social Engineering Attacks; Physical Attacks; Insider Attacks; Using BackTrack LiveCD Linux Distribution; Using Metasploit; Dradis and Managing a Pen Test; Exploiting; Progamming SProgrammingills; Basic Linux Exploits; Advanced Linux Exploits; Shellcode Strategies; Writing Linux Shell Code; Basic Windows Exploits; Client Content Based Attacks; Web Server Attacks; VoIP Attacks; SCADA Attacks; Vulnerability Analysis; Passive Analysis; Advanced Static Analysis with IDA Pro; Advanced Reverse Engineering; Client-Side Browser Exploits; Exploiting Windows Access Control Model; Intelligent Fuzzing with Sulley; From Vulnerability to Exploit; Closing the Holes: Mitigation Techniques; Malware Analysis; Collecting Malware and Initial Analysis; Hacking Malware


Table of contents

Part I: Introduction to Ethical Disclosure
1 Ethics of Ethical Hacking
2 Ethical Hacking and the Legal System
3 Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
4 Social Engineering Attacks
5 Physical Attacks
6 Insider Attacks
7 Using BackTrack LiveCD Linux Distribution
8 Using Metasploit
9 Dradis and Managing a Pen Test
Part III: Exploiting
10 Progamming SProgrammingills
11 Basic Linux Exploits
12 Advanced Linux Exploits
13 Shellcode Strategies
14 Writing Linux Shell Code
15 Basic Windows Exploits
16 Client Content Based Attacks
17 Web Server Attacks
18 VoIP Attacks
19 SCADA Attacks
Part IV: Vulnerability Analysis
20 Passive Analysis
21 Advanced Static Analysis with IDA Pro
22 Advanced Reverse Engineering
23 Client-Side Browser Exploits
24 Exploiting Windows Access Control Model
25 Intelligent Fuzzing with Sulley
26 From Vulnerability to Exploit
27 Closing the Holes: Mitigation Techniques
Part V: Malware Analysis
28 Collecting Malware and Initial Analysis
29 Hacking Malware


Author comments

Shon Harris, CISSP, MCSE, is the president of Logical Security, a security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and a bestselling author. She was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

Allen Harper, CISSP, a retired Marine Corps Major, is the president and founder of N2NetSecurity, Inc., and a faculty member for the Institute for Applied Network Security, He has worked as a security consultant for the Internal Revenue Service and for Logical Security, LLC.

Jonathan Ness is a software security engineer at Microsoft. He is a member of an Air National Guard unit where he leads network penetration tests against military facilities across the country and helps define the information warfare aggressor mission for the Air Force.

Terron Williams, NSA IAM-IEM, CEH, CSSLP, works for Elster Electricity as a Senior Test Engineer with his primary focus on Smart Grid Security. He has served on the editorial board for Hakin9 Magazine.

Gideon J. Lenkey, CISSP co-founded Ra Security Systems, a network security monitoring and consultancy. He has provided advanced training to the FBI and is the sitting president of the FBI's InfraGard chapter in New Jersey.





Copyright 2013 McGraw-Hill Global Education Holdings, LLC

WELCOME!

Before you can enjoy free downloads from McGraw-Hill Professional, we ask that you please provide your email address and country.



Yes, I want to receive other special offer.