|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn904597568 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150310s2015 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d B24X7
|d COO
|d TEFOD
|d DEBBG
|d OCLCF
|d TEFOD
|d OCLCA
|d TOH
|d C6I
|d RDF
|d UKSSU
|d EBLCP
|d YDX
|d HS0
|d DST
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 907364089
|a 1180306953
|a 1300599370
|a 1303292942
|
020 |
|
|
|a 9780071838504
|q electronic bk.
|
020 |
|
|
|a 0071838503
|q electronic bk.
|
020 |
|
|
|z 9780071832380
|
020 |
|
|
|z 0071832386
|
029 |
1 |
|
|a DEBBG
|b BV042682764
|
029 |
1 |
|
|a DEBSZ
|b 446579653
|
029 |
1 |
|
|a AU@
|b 000057234112
|
035 |
|
|
|a (OCoLC)904597568
|z (OCoLC)907364089
|z (OCoLC)1180306953
|z (OCoLC)1300599370
|z (OCoLC)1303292942
|
037 |
|
|
|a CL0500000566
|b Safari Books Online
|
037 |
|
|
|a 47D3791B-FC9D-487E-9D30-F144329D0B30
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Regalado, Daniel,
|e author.
|
245 |
1 |
0 |
|a Gray hat hacking :
|b the ethical hacker's handbook /
|c Daniel Regalado [and 7 others].
|
246 |
3 |
0 |
|a Ethical hacker's handbook
|
250 |
|
|
|a Fourth edition.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
|
|
|a Description based on print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cover -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I Crash Course: Preparing for the War -- Chapter 1 Ethical Hacking and the Legal System -- Why You Need to Understand Your Enemy's Tactics -- Recognizing Trouble When It Happens -- The Ethical Hacking Process -- The Penetration Testing Process -- What Would an Unethical Hacker Do Differently? -- The Rise of Cyberlaw -- Understanding Individual Cyberlaws -- The Controversy of "Hacking" Tools -- Vulnerability Disclosure -- Different Teams and Points of View
|
505 |
8 |
|
|a How Did We Get Here? -- CERT's Current Process -- Organization for Internet Safety -- Conflicts Will Still Exist -- "No More Free Bugs" -- Bug Bounty Programs -- Summary -- References -- For Further Reading -- Chapter 2 Programming Survival Skills -- C Programming Language -- Basic C Language Constructs -- Sample Program -- Compiling with gcc -- Computer Memory -- Random Access Memory (RAM) -- Endian -- Segmentation of Memory -- Programs in Memory -- Buffers -- Strings in Memory -- Pointers -- Putting the Pieces of Memory Together -- Intel Processors -- Registers -- Assembly Language Basics
|
505 |
8 |
|
|a Machine vs. Assembly vs. C -- AT&T vs. NASM -- Addressing Modes -- Assembly File Structure -- Assembling -- Debugging with gdb -- gdb Basics -- Disassembly with gdb -- Python Survival Skills -- Getting Python -- Hello World in Python -- Python Objects -- Strings -- Numbers -- Lists -- Dictionaries -- Files with Python -- Sockets with Python -- Summary -- References -- For Further Reading -- Chapter 3 Static Analysis -- Ethical Reverse Engineering -- Why Bother with Reverse Engineering? -- Reverse Engineering Considerations -- Source Code Analysis -- Source Code Auditing Tools
|
505 |
8 |
|
|a The Utility of Source Code Auditing Tools -- Manual Source Code Auditing -- Automated Source Code Analysis -- Binary Analysis -- Manual Auditing of Binary Code -- Automated Binary Analysis Tools -- Summary -- For Further Reading -- Chapter 4 Advanced Analysis with IDA Pro -- Static Analysis Challenges -- Stripped Binaries -- Statically Linked Programs and FLAIR -- Data Structure Analysis -- Quirks of Compiled C++ Code -- Extending IDA Pro -- Scripting in IDAPython -- Example 4-1: Decrypting Strings in Place -- Executing Python Code -- Summary -- For Further Reading -- Chapter 5 World of Fuzzing
|
505 |
8 |
|
|a Introduction to Fuzzing -- Choosing a Target -- Input Types -- Ease of Automation -- Complexity -- Types of Fuzzers -- Mutation Fuzzers -- Generation Fuzzers -- Getting Started -- Finding the Fuzzing Templates -- Lab 5-1: Collecting Samples from the Internet Archive -- Choosing the Optimal Template Set with Code Coverage -- Lab 5-2: Selecting the Best Samples for Fuzzing -- Peach Fuzzing Framework -- Peach Fuzzing Strategies -- Speed Does Matter -- Crash Analysis -- Lab 5-3: Mutation Fuzzing with Peach -- Other Mutation Fuzzers -- Generation Fuzzers -- Summary -- For Further Reading
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hackers
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Computer Science.
|2 hilcc
|
650 |
|
7 |
|a Computing & information technology.
|2 thema
|
650 |
|
7 |
|a Computer networking & communications.
|2 thema
|
650 |
|
7 |
|a Ethical & social aspects of IT.
|2 thema
|
650 |
|
7 |
|a Computer fraud & hacking.
|2 thema
|
650 |
|
7 |
|a Network security.
|2 thema
|
650 |
|
7 |
|a Computers and IT.
|2 ukslc
|
776 |
0 |
8 |
|i Print version:
|a Regalado, Daniel.
|t Gray hat hacking.
|b Fourth edition.
|d New York : McGraw-Hill, [2015]
|z 9780071832380
|w (OCoLC)900478166
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071832380/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00077172
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6258146
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16841148
|
938 |
|
|
|a Internet Archive
|b INAR
|n grayhathackinget0000rega
|
994 |
|
|
|a 92
|b IZTAP
|