Table of Contents for
Gray Hat Hacking The Ethical Hacker’s Handbook

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Gray Hat Hacking The Ethical Hacker’s Handbook by Jonathan Ness Published by McGraw-Hill, 2011
  1. Cover Page
  2. Gray Hat Hacking the Ethical Hacker’s Handbook
  3. Gray Hat Hacking the Ethical Hacker’s Handbook
  4. Copyright Page
  5. Gray Hat Hacking the Ethical Hacker’s Handbook
  6. Gray Hat Hacking the Ethical Hacker’s Handbook
  7. Gray Hat Hacking the Ethical Hacker’s Handbook
  8. Gray Hat Hacking the Ethical Hacker’s Handbook
  9. Contents
  10. Preface
  11. Acknowledgments
  12. Introduction
  13. Part I Introduction to Ethical Disclosure
  14. Chapter 1 Ethics of Ethical Hacking
  15. Chapter 2 Ethical Hacking and the Legal System
  16. Chapter 3 Proper and Ethical Disclosure
  17. Part II Penetration Testing and Tools
  18. Chapter 4 Social Engineering Attacks
  19. Chapter 5 Physical Penetration Attacks
  20. Chapter 6 Insider Attacks
  21. Chapter 7 Using the BackTrack Linux Distribution
  22. Chapter 8 Using Metasploit
  23. Chapter 9 Managing a Penetration Test
  24. Part III Exploiting
  25. Chapter 10 Programming Survival Skills
  26. Chapter 11 Basic Linux Exploits
  27. Chapter 12 Advanced Linux Exploits
  28. Chapter 13 Shellcode Strategies
  29. Chapter 14 Writing Linux Shellcode
  30. Chapter 15 Windows Exploits
  31. Chapter 16 Understanding and Detecting Content-Type Attacks
  32. Chapter 17 Web Application Security Vulnerabilities
  33. Chapter 18 VoIP Attacks
  34. Chapter 19 SCADA Attacks
  35. Part IV Vulnerability Analysis
  36. Chapter 20 Passive Analysis
  37. Chapter 21 Advanced Static Analysis with IDA Pro
  38. Chapter 22 Advanced Reverse Engineering
  39. Chapter 23 Client-Side Browser Exploits
  40. Chapter 24 Exploiting the Windows Access Control Model
  41. Chapter 25 Intelligent Fuzzing with Sulley
  42. Chapter 26 From Vulnerability to Exploit
  43. Chapter 27 Closing the Holes: Mitigation
  44. Part V Malware Analysis
  45. Chapter 28 Collecting Malware and Initial Analysis
  46. Chapter 29 Hacking Malware
  47. Index

ACKNOWLEDGMENTS

Each of the authors would like to thank the editors at McGraw-Hill. In particular, we would like to thank Joya Anthony. You really kept us on track and helped us through the process. Your dedication to this project was truly noteworthy. Thanks.

Allen Harper would like to thank his wonderful wife, Corann, and daughters, Haley and Madison, for their support and understanding through this third edition. It is wonderful to see our family grow stronger in Christ. I love you each dearly. In addition, Allen would like to thank the members of his Church for their love and support. In particular, Rob Martin and Ronnie Jones have been true brothers in the Lord and great friends. Also, Allen would like to thank other hackers who provided assistance through the process: Alex Sotirov, Mark Dowd, Alexey Sintsov, Shuichiro Suzuki, Peter Van Eeckhoutte, Stéfan Le Berre, and Damien Cauquil.

Shon Harris would like to thank the other authors and the team members for their continued dedication to this project and continual contributions to the industry as a whole. Shon would also like to thank the crazy Fairbairn sisters—Kathy Conlon, Diane Marshall, and Kristy Gorenz for their lifelong support of Shon and her efforts.

Jonathan Ness would like to thank Jessica, his amazing wife, for tolerating the long hours required for him to write this book (and hold his job, and his second job, and third “job,” and all the side projects). Thanks also to Didier Stevens for the generous help with Chapter 16 (and for providing the free PDF analysis tools at http://blog.didierstevens.com/programs/pdf-tools). Big thanks also to Terry McCorkle for his expert guidance and advice, which led to the current Chapter 17—you’re a life-saver, Terry! Finally, Jonathan would like to thank the mentors, teachers, coworkers, pastors, family, and friends who have guided him along his way, contributing more to his success than they’ll ever know.

Chris Eagle would like to acknowledge all of the core members of the DDTEK crew. The hard work they put in and the skills they bring to the table never cease to amaze him.

Gideon Lenkey would like to thank his loving and supportive family and friends who patiently tolerate his eccentric pursuits. He’d also like to thank all of the special agents of the FBI, present and retired, who have kept boredom from his door!

Terron Williams would like to thank his lovely wife, Mekka, and his stepson, Christian Morris. The two of you are the center of my life, and I appreciate each and every second that we share together. God is truly good all of the time. In addition, Terron would like to thank his mother, Christina Williams, and his sister, Sharon Williams-Scott. There is not a moment that goes by that I am not grateful for the love and the support that you have always shown to me.