Gray Hat Hacking, Second Edition

Front Cover
McGraw Hill Professional, Jan 10, 2008 - Computers - 576 pages
8 Reviews

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group

"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker


What people are saying - Write a review

User ratings

5 stars
4 stars
3 stars
2 stars
1 star

User Review - Flag as inappropriate

User Review - Flag as inappropriate



Introduction to Ethical Disclosure
Penetration Testing and Tools
Exploits 101
Vulnerability Analysis
Malware Analysis

Other editions - View all

Common terms and phrases

Popular passages

Page 290 - This is free software, and you are welcome to redistribute it under certain conditions; type 'show c
Page 19 - Access card" means any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access card, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds, other than a transfer originated solely by a paper instrument.
Page xxii - HE who has a thousand friends has not a friend to spare, And he who has one enemy will meet him everywhere.
Page 35 - Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.
Page 261 - Please tell Microsoft about this problem. We have created an error report that you can send to help us improve Microsoft Visual FoxPro 9.0.
Page 35 - ... effectively controls access to a work protected under this title. (3) As used in this subsection (A) to "circumvent a technological measure" means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and (B) a technological measure "effectively controls access to a work...
Page 25 - ... knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer...
Page 35 - A technological measure effectively controls access to a work if the measure, "in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to the...

References to this book

About the author (2008)

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.

Jonathan Ness, CHFI, is a lead software security engineer at Microsoft.

Bibliographic information