Gray Hat Hacking, Second Edition (Google eBook)

Front Cover
McGraw Hill Professional, Jan 10, 2008 - Computers - 576 pages
8 Reviews

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group

"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

  

What people are saying - Write a review

User ratings

5 stars
5
4 stars
1
3 stars
2
2 stars
0
1 star
0

User Review - Flag as inappropriate

NICE

Contents

Introduction to Ethical Disclosure
1
Penetration Testing and Tools
73
Exploits 101
119
Vulnerability Analysis
275
Malware Analysis
497
Index
537
Copyright

Common terms and phrases

Popular passages

Page 290 - This is free software, and you are welcome to redistribute it under certain conditions; type 'show c
Page 19 - Access card" means any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access card, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds, other than a transfer originated solely by a paper instrument.
Page xxii - HE who has a thousand friends has not a friend to spare, And he who has one enemy will meet him everywhere.
Page 35 - Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.
Page 261 - Please tell Microsoft about this problem. We have created an error report that you can send to help us improve Microsoft Visual FoxPro 9.0.
Page 35 - ... effectively controls access to a work protected under this title. (3) As used in this subsection (A) to "circumvent a technological measure" means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and (B) a technological measure "effectively controls access to a work...
Page 25 - ... knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer...
Page 35 - A technological measure effectively controls access to a work if the measure, "in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to the...

References to this book

About the author (2008)

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.

Jonathan Ness, CHFI, is a lead software security engineer at Microsoft.

Bibliographic information