Cargando…

Gray hat hacking : the ethical hacker's handbook /

A thorough revision of the bestselling guide to the tools and tricks of the hybrid hacker. Written by seasoned security authors and instructors, this fully updated volume offers a comprehensive overview of today's hacking and computer security landscape.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Harris, Shon
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill, ©2008.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn192020173
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 080214s2008 nyua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d IDEBK  |d OCLCQ  |d TEFOD  |d CDX  |d CDN  |d COCUF  |d B24X7  |d CNCGM  |d UMI  |d CEF  |d DEBSZ  |d OCLCQ  |d OCLCF  |d P4I  |d OCLCA  |d OCL  |d OCLCQ  |d E7B  |d MEAUC  |d TEFOD  |d OCLCQ  |d PIFSG  |d X#7  |d OCLCQ  |d WY@  |d OCLCA  |d WCO  |d XQH  |d OCLCQ  |d TOH  |d VT2  |d C6I  |d OCLCQ  |d D6H  |d LIV  |d EBLCP  |d A7U  |d OCLCQ  |d UKAHL  |d AJS  |d OCLCQ  |d OCLCO  |d ANO  |d OCLCQ 
019 |a 228414171  |a 233792374  |a 264537568  |a 503442119  |a 648336447  |a 656452036  |a 688507124  |a 958558584  |a 1084376951  |a 1129358904  |a 1152999731  |a 1192330005  |a 1262687924 
020 |a 9780071595537  |q (electronic bk.) 
020 |a 0071595538  |q (electronic bk.) 
020 |a 0071495681  |q (alk. paper) 
020 |a 9780071495684  |q (alk. paper) 
029 1 |a AU@  |b 000053251408 
029 1 |a CDX  |b 7447662 
029 1 |a DEBSZ  |b 355393581 
029 1 |a HEBIS  |b 291466990 
029 1 |a NZ1  |b 13334916 
035 |a (OCoLC)192020173  |z (OCoLC)228414171  |z (OCoLC)233792374  |z (OCoLC)264537568  |z (OCoLC)503442119  |z (OCoLC)648336447  |z (OCoLC)656452036  |z (OCoLC)688507124  |z (OCoLC)958558584  |z (OCoLC)1084376951  |z (OCoLC)1129358904  |z (OCoLC)1152999731  |z (OCoLC)1192330005  |z (OCoLC)1262687924 
037 |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a BE0E4D1F-AE34-4EB8-B3EA-DAF97CA3E54A  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b G743 2008eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Gray hat hacking :  |b the ethical hacker's handbook /  |c Shon Harris [and others]. 
250 |a 2nd ed. 
260 |a New York :  |b McGraw-Hill,  |c ©2008. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from PDF title page (viewed February 14, 2008). 
504 |a Includes bibliographical references and index. 
505 0 |a Cover -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Introduction to Ethical Disclosure -- Chapter 1 Ethics of Ethical Hacking -- How Does This Stuff Relate to an Ethical Hacking Book? -- Security Does Not Like Complexity -- Chapter 2 Ethical Hacking and the Legal System -- Addressing Individual Laws -- Chapter 3 Proper and Ethical Disclosure -- You Were Vulnerable for How Long? -- Different Teams and Points of View -- CERT's Current Process -- Full Disclosure Policy (RainForest Puppy Policy) -- Organization for Internet Safety (OIS) -- Conflicts Will Still Exist -- Case Studies -- Zero Day Initiative -- So What Should We Do from Here on Out? -- Part II: Penetration Testing and Tools -- Chapter 4 Using Metasploit -- Metasploit: The Big Picture -- Getting Metasploit -- Exploiting Client-Side Vulnerabilities with Metasploit -- Using Metasploit as a Man-in-the-Middle Password Stealer -- Using Metasploit to Auto-Attack -- Inside Metasploit Modules -- Chapter 5 Using the BackTrack LiveCD Linux Distribution -- BackTrack: The Big Picture -- Creating the BackTrack CD -- Booting BackTrack -- Exploring the BackTrack X-Windows Environment -- Writing BackTrack to Your USB Memory Stick -- Saving Your BackTrack Configurations -- Creating a Directory-Based or File-Based Module with dir2lzm -- Creating a New Base Module with All the Desired Directory Contents -- Cheat Codes and Selectively Loading Modules -- Metasploit db_autopwn -- Tools -- Part III: Exploits 101 -- Chapter 6 Programming Survival Skills -- C Programming Language -- Computer Memory -- Intel Processors -- Assembly Language Basics -- Debugging with gdb -- Python Survival Skills -- Chapter 7 Basic Linux Exploits -- Stack Operations -- Buffer Overflows -- Local Buffer Overflow Exploits -- Exploit Development Process -- Chapter 8 Advanced Linux Exploits -- Format String Exploits -- Heap Overflow Exploits -- Memory Protection Schemes -- Chapter 9 Shellcode Strategies -- User Space Shellcode -- Other Shellcode Considerations -- Kernel Space Shellcode -- Chapter 10 Writing Linux Shellcode -- Basic Linux Shellcode -- Implementing Port-Binding Shellcode -- Implementing Reverse Connecting Shellcode -- Encoding Shellcode -- Automating Shellcode Generation with Metasploit -- Chapter 11 Basic Windows Exploits -- Compiling and Debugging Windows Programs -- Windows Exploits -- Part IV: Vulnerability Analysis -- Chapter 12 Passive Analysis -- Ethical Reverse Engineering -- Why Reverse Engineering? -- Source Code Analysis -- Binary Analysis -- Chapter 13 Advanced Static Analysis with IDA Pro -- Static Analysis Challenges -- Extending IDA -- Chapter 14 Advanced Reverse Engineering -- Why Try to Break Software? -- The Software Development Process -- Instrumentation Tools -- Fuzzing -- Instrumented Fuzzing Tools and Techniques -- Chapter 15 Client-Side Browser Exploits -- Why Client-Side Vulnerabilities Are Interesting -- Internet Explorer Security Concepts -- History of Client-Side Exploits and Latest Trends -- Finding New Browser-Based Vulnerabilities -- Heap Spray to Exploit -- Protecting Yourself from Client-Side Exp. 
520 |a A thorough revision of the bestselling guide to the tools and tricks of the hybrid hacker. Written by seasoned security authors and instructors, this fully updated volume offers a comprehensive overview of today's hacking and computer security landscape. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Computer security.  |2 sears 
650 7 |a Computer hackers.  |2 sears 
655 7 |a Study guides.  |2 fast  |0 (OCoLC)fst01423888 
700 1 |a Harris, Shon. 
776 0 8 |i Print version:  |z 9780071495684  |w (DLC) 2007047838 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071495684/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26367809 
938 |a Books 24x7  |b B247  |n bks00023664 
938 |a Coutts Information Services  |b COUT  |n 7447662  |c 34.19 GBP 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4656872 
938 |a EBSCOhost  |b EBSC  |n 218895 
938 |a YBP Library Services  |b YANK  |n 2777028 
994 |a 92  |b IZTAP