Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionTHE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
|
Contents
Introduction to Ethical Disclosure | 1 |
Penetration Testing and Tools | 75 |
Exploiting | 171 |
Copyright | |
3 other sections not shown
Common terms and phrases
activities allow analysis application attack attempt binary block buffer build bytes cause chapter char command common compiled connection contains cover crash create debugger developed discussed engineering environment example execute exploit Figure format function fuzzing granted important input install instruction Internet loaded look machine malware memory method Microsoft object Once operating option password patch perform pointer port possible privilege problem protection protocol push References request result saved script server shell shellcode shown shows simple specific stack stored string structure things tion understand variable vendor vulnerability Windows write