Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams.
3rd ed
New York McGraw Hill Professional
2011
1 electronic text (xxiv, 693 p. : ill.) : PDF file.
Print version c2011.
Ethics of ethical hacking -- Ethical hacking and the legal system -- Proper and ethical disclosure -- Social engineering attacks -- Physical penetration attacks -- Insider attacks -- Using the backtrack Linux distribution -- Using Metasploit -- Managing a penetration test -- Programming survival skills -- Basic Linux exploits -- Advanced Linux exploits -- Shellcode strategies -- Writing Linux shellcode -- Windows exploits -- Understanding and detecting content-type attacks -- Web application security vulnerabilities -- VoIP attacks -- SCADA attacks -- Passive analysis -- Advanced static analysis with IDA pro -- Advanced reverse engineering Client-side browser exploits -- Exploiting the Windows access control model -- Intelligent fuzzing with Sulley -- From vulnerability to exploit -- Closing the holes: mitigation -- Collecting malware and initial analysis -- Hacking malware.
Online index title: Gray hat hacking the ethical hackers handbook, 3rd edition
QA76
.
9
.
A25
A454
2011
Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, Terron Williams.