Cargando…

Gray hat hacking : the ethical hacker's handbook /

A thorough revision of the bestselling guide to the tools and tricks of the hybrid hacker. Written by seasoned security authors and instructors, this fully updated volume offers a comprehensive overview of today's hacking and computer security landscape.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Harris, Shon
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill, ©2008.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Contents
  • Preface
  • Acknowledgments
  • Introduction
  • Part I: Introduction to Ethical Disclosure
  • Chapter 1 Ethics of Ethical Hacking
  • How Does This Stuff Relate to an Ethical Hacking Book?
  • Security Does Not Like Complexity
  • Chapter 2 Ethical Hacking and the Legal System
  • Addressing Individual Laws
  • Chapter 3 Proper and Ethical Disclosure
  • You Were Vulnerable for How Long?
  • Different Teams and Points of View
  • CERT's Current Process
  • Full Disclosure Policy (RainForest Puppy Policy)
  • Organization for Internet Safety (OIS)
  • Conflicts Will Still Exist
  • Case Studies
  • Zero Day Initiative
  • So What Should We Do from Here on Out?
  • Part II: Penetration Testing and Tools
  • Chapter 4 Using Metasploit
  • Metasploit: The Big Picture
  • Getting Metasploit
  • Exploiting Client-Side Vulnerabilities with Metasploit
  • Using Metasploit as a Man-in-the-Middle Password Stealer
  • Using Metasploit to Auto-Attack
  • Inside Metasploit Modules
  • Chapter 5 Using the BackTrack LiveCD Linux Distribution
  • BackTrack: The Big Picture
  • Creating the BackTrack CD
  • Booting BackTrack
  • Exploring the BackTrack X-Windows Environment
  • Writing BackTrack to Your USB Memory Stick
  • Saving Your BackTrack Configurations
  • Creating a Directory-Based or File-Based Module with dir2lzm
  • Creating a New Base Module with All the Desired Directory Contents
  • Cheat Codes and Selectively Loading Modules
  • Metasploit db_autopwn
  • Tools
  • Part III: Exploits 101
  • Chapter 6 Programming Survival Skills
  • C Programming Language
  • Computer Memory
  • Intel Processors
  • Assembly Language Basics
  • Debugging with gdb
  • Python Survival Skills
  • Chapter 7 Basic Linux Exploits
  • Stack Operations
  • Buffer Overflows
  • Local Buffer Overflow Exploits
  • Exploit Development Process
  • Chapter 8 Advanced Linux Exploits
  • Format String Exploits
  • Heap Overflow Exploits
  • Memory Protection Schemes
  • Chapter 9 Shellcode Strategies
  • User Space Shellcode
  • Other Shellcode Considerations
  • Kernel Space Shellcode
  • Chapter 10 Writing Linux Shellcode
  • Basic Linux Shellcode
  • Implementing Port-Binding Shellcode
  • Implementing Reverse Connecting Shellcode
  • Encoding Shellcode
  • Automating Shellcode Generation with Metasploit
  • Chapter 11 Basic Windows Exploits
  • Compiling and Debugging Windows Programs
  • Windows Exploits
  • Part IV: Vulnerability Analysis
  • Chapter 12 Passive Analysis
  • Ethical Reverse Engineering
  • Why Reverse Engineering?
  • Source Code Analysis
  • Binary Analysis
  • Chapter 13 Advanced Static Analysis with IDA Pro
  • Static Analysis Challenges
  • Extending IDA
  • Chapter 14 Advanced Reverse Engineering
  • Why Try to Break Software?
  • The Software Development Process
  • Instrumentation Tools
  • Fuzzing
  • Instrumented Fuzzing Tools and Techniques
  • Chapter 15 Client-Side Browser Exploits
  • Why Client-Side Vulnerabilities Are Interesting
  • Internet Explorer Security Concepts
  • History of Client-Side Exploits and Latest Trends
  • Finding New Browser-Based Vulnerabilities
  • Heap Spray to Exploit
  • Protecting Yourself from Client-Side Exp.