Gray Hat Hacking, Second Edition

by
Edition: 2nd
Format: Paperback
Pub. Date: 2007-12-20
Publisher(s): McGraw-Hill Osborne Media
List Price: $49.99

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$62.49
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$62.49*

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

Author Biography

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.

Jonathan Ness, CHFI, is a lead software security engineer at Microsoft.

Table of Contents

Introduction to Ethical Disclosure
Ethics of Ethical Hacking
Ethical Hacking and the Legal System
Proper and Ethical Disclosure
Penetration Testing and Tools
Using Metasploit
Using the BackTrack LiveCD Linux Distribution
Exploits 101
Programming Survival Skills
Basic Linux Exploits
Advanced Linux Exploits
Shellcode Strategies
Writing Linux Shellcode
Basic Windows Exploits
Vulnerability Analysis
Passive Analysis
Advanced Static Analysis with IDA Pro
Advanced Reverse Engineering
Client-Side Browser Exploits
Exploiting Windows Access Control Model for Local Elevation of Privilege
Intelligent Fuzzing with Sulley
From Vulnerability to Exploit
Closing the Holes: Mitigation
Malware Analysis
Collecting Malware and Initial Analysis
Hacking Malware
Index
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.