Gray Hat Hacking, Second Edition

Front Cover
Mcgraw-hill, Dec 20, 2007 - Computers - 550 pages
3 Reviews
Table of contents - Part I, Introduction to Ethical Disclosure; Chapter 1. Ethics of Ethical Hacking; Chapter 2. Ethical Hacking and the Legal System; Chapter 3. Proper and Ethical Disclosure; Part II, Penetration Testing and Tools; Chapter 4. Using Metasploit; Chapter 5. Using the BackTrack LiveCD Linux Distribution; Part III, Exploits 101; Chapter 6. Programming Survival Skills; Chapter 7. Basic Linux Exploits; Chapter 8. Advanced Linux Exploits; Chapter 9. Shellcode Strategies; Chapter 10. Writing Linux Shellcode; Chapter 11. Basic Windows Exploits; Part IV, Vulnerability Analysis; Chapter 12. Passive Analysis; Chapter 13. Advanced Static Analysis with IDA Pro; Chapter 14. Advanced Reverse Engineering; Chapter 15. Client-Side Browser Exploits; Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege; Chapter 17. Intelligent Fuzzing with Sulley; Chapter 18. From Vulnerability to Exploit; Chapter 19. Closing the Holes - Mitigation; Part V, Malware Analysis; Chapter 20. Collecting Malware and Initial Analysis; Chapter 21. Hacking Malware; Index.

What people are saying - Write a review

User Review - Flag as inappropriate

up-to-date contents & nice presentation

About the author (2007)

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.

Jonathan Ness, CHFI, is a lead software security engineer at Microsoft.

Bibliographic information