Table of Contents for
Gray Hat Hacking The Ethical Hacker’s Handbook

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Gray Hat Hacking The Ethical Hacker’s Handbook by Jonathan Ness Published by McGraw-Hill, 2011
  1. Cover Page
  2. Gray Hat Hacking the Ethical Hacker’s Handbook
  3. Gray Hat Hacking the Ethical Hacker’s Handbook
  4. Copyright Page
  5. Gray Hat Hacking the Ethical Hacker’s Handbook
  6. Gray Hat Hacking the Ethical Hacker’s Handbook
  7. Gray Hat Hacking the Ethical Hacker’s Handbook
  8. Gray Hat Hacking the Ethical Hacker’s Handbook
  9. Contents
  10. Preface
  11. Acknowledgments
  12. Introduction
  13. Part I Introduction to Ethical Disclosure
  14. Chapter 1 Ethics of Ethical Hacking
  15. Chapter 2 Ethical Hacking and the Legal System
  16. Chapter 3 Proper and Ethical Disclosure
  17. Part II Penetration Testing and Tools
  18. Chapter 4 Social Engineering Attacks
  19. Chapter 5 Physical Penetration Attacks
  20. Chapter 6 Insider Attacks
  21. Chapter 7 Using the BackTrack Linux Distribution
  22. Chapter 8 Using Metasploit
  23. Chapter 9 Managing a Penetration Test
  24. Part III Exploiting
  25. Chapter 10 Programming Survival Skills
  26. Chapter 11 Basic Linux Exploits
  27. Chapter 12 Advanced Linux Exploits
  28. Chapter 13 Shellcode Strategies
  29. Chapter 14 Writing Linux Shellcode
  30. Chapter 15 Windows Exploits
  31. Chapter 16 Understanding and Detecting Content-Type Attacks
  32. Chapter 17 Web Application Security Vulnerabilities
  33. Chapter 18 VoIP Attacks
  34. Chapter 19 SCADA Attacks
  35. Part IV Vulnerability Analysis
  36. Chapter 20 Passive Analysis
  37. Chapter 21 Advanced Static Analysis with IDA Pro
  38. Chapter 22 Advanced Reverse Engineering
  39. Chapter 23 Client-Side Browser Exploits
  40. Chapter 24 Exploiting the Windows Access Control Model
  41. Chapter 25 Intelligent Fuzzing with Sulley
  42. Chapter 26 From Vulnerability to Exploit
  43. Chapter 27 Closing the Holes: Mitigation
  44. Part V Malware Analysis
  45. Chapter 28 Collecting Malware and Initial Analysis
  46. Chapter 29 Hacking Malware
  47. Index

Gray Hat Hacking, Third Edition Reviews

“Bigger, better, and more thorough, the Gray Hat Hacking series is one that I’ve enjoyed from the start. Always right on time information, always written by experts. The Third Edition is a must-have update for new and continuing security experts.”

—Jared D. DeMott

Principle Security Researcher, Crucial Security, Inc.

“This book is a great reference for penetration testers and researchers who want to step up and broaden their skills in a wide range of IT security disciplines.”

—Peter Van Eeckhoutte (corelanc0d3r)

Founder, Corelan Team

“I am often asked by people how to get started in the InfoSec world, and I point people to this book. In fact, if someone is an expert in one arena and needs a leg up in another, I still point them to this book. This is one book that should be in every security professional’s library—the coverage is that good.”

—Simple Nomad

Hacker

“The Third Edition of Gray Hat Hacking builds upon a well-established foundation to bring even deeper insight into the tools and techniques in an ethical hacker’s arsenal. From software exploitation to SCADA attacks, this book covers it all. Gray Hat Hacking is without doubt the definitive guide to the art of computer security published in this decade.”

—Alexander Sotirov

Security Rockstar and Founder of the Pwnie Awards

Gray Hat Hacking is an excellent ‘Hack-by-example’ book. It should be read by anyone who wants to master security topics, from physical intrusions to Windows memory protections.”

—Dr. Martin Vuagnoux

Cryptographer/Computer security expert

Gray Hat Hacking is a must-read if you’re serious about INFOSEC. It provides a much-needed map of the hacker’s digital landscape. If you’re curious about hacking or are pursuing a career in INFOSEC, this is the place to start.”

—Johnny Long

Professional Hacker, Founder of Hackers for Charity.org