Gray Hat Hacking, Second Edition"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker |
Contents
1 | |
Penetration Testing and Tools | 73 |
Exploits 101 | 119 |
Vulnerability Analysis | 275 |
Malware Analysis | 497 |
Index | 537 |
Common terms and phrases
allow analysis application arguments attack attempt basic binary block buffer build bytes cause chapter char command communication compiled connection contain crash create DACL debugger developed environment example execute exploit Figure format function fuzzing granted heap important input install instruction interesting Internet loaded look machine malware memory Metasploit Microsoft module NOTE object operating options overflow patch pointer port possible privilege problem protection push References reported request result saved script server session shell shellcode shows simple socket specific stack step stored string structure things tion understand variable vendor vulnerability Windows write
Popular passages
Page 290 - This is free software, and you are welcome to redistribute it under certain conditions; type 'show c
Page 19 - Access card" means any card, plate, code, account number, or other means of account access that can be used, alone or in conjunction with another access card, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds, other than a transfer originated solely by a paper instrument.
Page xxii - HE who has a thousand friends has not a friend to spare, And he who has one enemy will meet him everywhere.
Page 35 - Contracting Parties shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restrict acts, in respect of their works, which are not authorized by the authors concerned or permitted by law.
Page 261 - Please tell Microsoft about this problem. We have created an error report that you can send to help us improve Microsoft Visual FoxPro 9.0.
Page 35 - ... effectively controls access to a work protected under this title. (3) As used in this subsection (A) to "circumvent a technological measure" means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner; and (B) a technological measure "effectively controls access to a work...
Page 25 - ... knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer...
Page 35 - A technological measure effectively controls access to a work if the measure, "in the ordinary course of its operation, requires the application of information or a process or a treatment, with the authority of the copyright owner, to gain access to the...