Cargando…

Gray hat hacking : the ethical hacker's handbook /

This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Regalado, Daniel (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill Education, [2015]
Edición:Fourth edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn904597568
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150310s2015 nyua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d B24X7  |d COO  |d TEFOD  |d DEBBG  |d OCLCF  |d TEFOD  |d OCLCA  |d TOH  |d C6I  |d RDF  |d UKSSU  |d EBLCP  |d YDX  |d HS0  |d DST  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 907364089  |a 1180306953  |a 1300599370  |a 1303292942 
020 |a 9780071838504  |q electronic bk. 
020 |a 0071838503  |q electronic bk. 
020 |z 9780071832380 
020 |z 0071832386 
029 1 |a DEBBG  |b BV042682764 
029 1 |a DEBSZ  |b 446579653 
029 1 |a AU@  |b 000057234112 
035 |a (OCoLC)904597568  |z (OCoLC)907364089  |z (OCoLC)1180306953  |z (OCoLC)1300599370  |z (OCoLC)1303292942 
037 |a CL0500000566  |b Safari Books Online 
037 |a 47D3791B-FC9D-487E-9D30-F144329D0B30  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Regalado, Daniel,  |e author. 
245 1 0 |a Gray hat hacking :  |b the ethical hacker's handbook /  |c Daniel Regalado [and 7 others]. 
246 3 0 |a Ethical hacker's handbook 
250 |a Fourth edition. 
264 1 |a New York :  |b McGraw-Hill Education,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 |a Description based on print version record. 
504 |a Includes bibliographical references and index. 
520 |a This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. --  |c Edited summary from book. 
505 0 |a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I Crash Course: Preparing for the War -- Chapter 1 Ethical Hacking and the Legal System -- Why You Need to Understand Your Enemy's Tactics -- Recognizing Trouble When It Happens -- The Ethical Hacking Process -- The Penetration Testing Process -- What Would an Unethical Hacker Do Differently? -- The Rise of Cyberlaw -- Understanding Individual Cyberlaws -- The Controversy of "Hacking" Tools -- Vulnerability Disclosure -- Different Teams and Points of View 
505 8 |a How Did We Get Here? -- CERT's Current Process -- Organization for Internet Safety -- Conflicts Will Still Exist -- "No More Free Bugs" -- Bug Bounty Programs -- Summary -- References -- For Further Reading -- Chapter 2 Programming Survival Skills -- C Programming Language -- Basic C Language Constructs -- Sample Program -- Compiling with gcc -- Computer Memory -- Random Access Memory (RAM) -- Endian -- Segmentation of Memory -- Programs in Memory -- Buffers -- Strings in Memory -- Pointers -- Putting the Pieces of Memory Together -- Intel Processors -- Registers -- Assembly Language Basics 
505 8 |a Machine vs. Assembly vs. C -- AT&T vs. NASM -- Addressing Modes -- Assembly File Structure -- Assembling -- Debugging with gdb -- gdb Basics -- Disassembly with gdb -- Python Survival Skills -- Getting Python -- Hello World in Python -- Python Objects -- Strings -- Numbers -- Lists -- Dictionaries -- Files with Python -- Sockets with Python -- Summary -- References -- For Further Reading -- Chapter 3 Static Analysis -- Ethical Reverse Engineering -- Why Bother with Reverse Engineering? -- Reverse Engineering Considerations -- Source Code Analysis -- Source Code Auditing Tools 
505 8 |a The Utility of Source Code Auditing Tools -- Manual Source Code Auditing -- Automated Source Code Analysis -- Binary Analysis -- Manual Auditing of Binary Code -- Automated Binary Analysis Tools -- Summary -- For Further Reading -- Chapter 4 Advanced Analysis with IDA Pro -- Static Analysis Challenges -- Stripped Binaries -- Statically Linked Programs and FLAIR -- Data Structure Analysis -- Quirks of Compiled C++ Code -- Extending IDA Pro -- Scripting in IDAPython -- Example 4-1: Decrypting Strings in Place -- Executing Python Code -- Summary -- For Further Reading -- Chapter 5 World of Fuzzing 
505 8 |a Introduction to Fuzzing -- Choosing a Target -- Input Types -- Ease of Automation -- Complexity -- Types of Fuzzers -- Mutation Fuzzers -- Generation Fuzzers -- Getting Started -- Finding the Fuzzing Templates -- Lab 5-1: Collecting Samples from the Internet Archive -- Choosing the Optimal Template Set with Code Coverage -- Lab 5-2: Selecting the Best Samples for Fuzzing -- Peach Fuzzing Framework -- Peach Fuzzing Strategies -- Speed Does Matter -- Crash Analysis -- Lab 5-3: Mutation Fuzzing with Peach -- Other Mutation Fuzzers -- Generation Fuzzers -- Summary -- For Further Reading 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 0 |a Hacking. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 6 |a Piratage informatique. 
650 7 |a Computer security  |2 fast 
650 7 |a Hackers  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Engineering & Applied Sciences.  |2 hilcc 
650 7 |a Computer Science.  |2 hilcc 
650 7 |a Computing & information technology.  |2 thema 
650 7 |a Computer networking & communications.  |2 thema 
650 7 |a Ethical & social aspects of IT.  |2 thema 
650 7 |a Computer fraud & hacking.  |2 thema 
650 7 |a Network security.  |2 thema 
650 7 |a Computers and IT.  |2 ukslc 
776 0 8 |i Print version:  |a Regalado, Daniel.  |t Gray hat hacking.  |b Fourth edition.  |d New York : McGraw-Hill, [2015]  |z 9780071832380  |w (OCoLC)900478166 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071832380/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00077172 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6258146 
938 |a YBP Library Services  |b YANK  |n 16841148 
938 |a Internet Archive  |b INAR  |n grayhathackinget0000rega 
994 |a 92  |b IZTAP