Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

by ; ; ; ; ;
Edition: 3rd
Format: Paperback
Pub. Date: 2011-01-06
Publisher(s): McGraw-Hill Osborne Media
List Price: $60.75

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$75.00
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$75.00*

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Customer Reviews

Into Hacker's World  June 1, 2011
by
Rating StarRating StarRating StarRating StarRating Star

Fully updated and expanded with nine new chapters, details the most recent vulnerabilities and remedies along with legal disclosure methods. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. You will know the basic of hacking in turn of protecting yourself from such attack. Highly recommended.






Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition: 5 out of 5 stars based on 1 user reviews.

Summary

The Latest Strategies For Uncovering Today's Most Devastating Attacks

Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

-Develop and launch exploits using BackTrack and Metasploit

-Employ physical, social engineering, and insider attack techniques

-Build Perl, Python, and Ruby scripts that initiate stack buffer overflows

-Understand and prevent malicious content in Adobe, Office, and multimedia files

-Detect and block client-side, Web server, VoIP, and SCADA attacks

-Reverse engineer, fuzz, and decompile Windows and Linux software

-Develop SQL injection, cross-site scripting, and forgery exploits

-Trap malware and rootkits using honeypots and SandBoxes

Table of Contents

Part I: Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
Chapter 4 Social Engineering Attacks
Chapter 5 Physical Penetration Attacks
Chapter 6 Insider Attacks
Chapter 7 Using the BackTrack Linux Distribution
Chapter 8 Using Metasploit
Chapter 9 Managing a Penetration Test
Part III: Exploiting
Chapter 10 Programming Survival Skills
Chapter 11 Basic Linux Exploits
Chapter 12 Advanced Linux Exploits
Chapter 13 Shellcode Strategies
Chapter 14 Writing Linux Shellcode
Chapter 15 Windows Exploits
Chapter 16 Understanding and Detecting Content-Type Attacks
Chapter 17 Web Application Security Vulnerabilities
Chapter 18 VoIP Attacks
Chapter 19 SCADA Attacks
Part IV: Vulnerability Analysis
Chapter 20 Passive Analysis
Chapter 21 Advanced Static Analysis with IDA Pro
Chapter 22 Advanced Reverse Engineering
Chapter 23 Client-Side Browser Exploits
Chapter 24 Exploiting the Windows Access Control Model
Chapter 25 Intelligent Fuzzing with Sulley
Chapter 26 From Vulnerability to Exploit
Chapter 27 Closing the Holes: Mitigation
Part V: Malware Analysis
Chapter 28 Collecting Malware and Initial Analysis
Chapter 29 Hacking Malware
Index

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.