We're sorry; this book is no longer available. Continue Shopping.

Gray Hat Hacking : The Ethical Hacker's Handbook

Harris, Shon, Harper, Allen, Eagle, Chris, Ness, Jonathan, Lester, Michael

Published by McGraw-Hill Osborne Media (edition 1), 2004
ISBN 10: 0072257091 / ISBN 13: 9780072257090
Used / Paperback / Quantity: 0
From BooksRun (Philadelphia, PA, U.S.A.)
Available From More Booksellers
View all  copies of this book

About the Book

Description:

Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Seller Inventory # 0072257091-11-1

About this title:

Synopsis: Analyze your company’s vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker’s Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position.

From the Back Cover:

Detect, ethically disclose, and repair security flaws before malicious hackers wreak havoc

Avoid devastating network attacks by acquiring the advanced skills malicious hackers and computer criminals are using today. Gray Hat Hacking: The Ethical Hacker’s Handbook takes you to the next level by explaining, line-by-line, the code behind the latest and most insidious hacking techniques, as well as their countermeasures. Many of the attacks described have been used to successfully carry out online fraud, identity theft, extortion, denial of service attacks, and access to critical and confidential data. Malicious hackers are dedicated to bringing about mayhem and destruction--this book will teach you how to identify and stop them.

  • Plan, script, and execute widespread security tests using redteaming approaches
  • Carry out advanced vulnerability assessments, penetration tests, code scans, and system auditing tests
  • Use the latest target discovery and fingerprinting tools: Paketto Keiretsu, Xprobe2, P0f, Amap, Winfingerprint
  • Generate error conditions and crashes within programs using fuzzers
  • Automate pen-tests with Python Survival Skills, Core Impact, CANVAS, and Metasploit
  • Deploy the latest sniffing tools/techniques: Ettercap, Dsniff, SMB/LANMan credential sniffing, Kerbsniff/Kerbcrack
  • Understand passive vs. active sniffing, including MAC flooding, ARP cache poisoning, MAC duplicating, and DNS poisoning
  • Use various classes of Reverse Engineering tools: Debugging, Code Coverage, Profiling, Flow Analysis, and Memory Monitoring Tools
  • Create proof of concept exploits using stack operations, local and remote buffer overflows, and heap overflows

"About this title" may belong to another edition of this title.

Bibliographic Details

Title: Gray Hat Hacking : The Ethical Hacker's ...
Publisher: McGraw-Hill Osborne Media (edition 1)
Publication Date: 2004
Binding: Paperback
Condition: Good
Edition: 1.