rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780071495684

Gray Hat Hacking, Second Edition

by
  • ISBN13:

    9780071495684

  • ISBN10:

    0071495681

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2007-12-20
  • Publisher: McGraw-Hill Osborne Media
  • View Upgraded Edition

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $12.50
  • Buy Used
    $37.49
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Summary

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker

Author Biography

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.

Jonathan Ness, CHFI, is a lead software security engineer at Microsoft.

Table of Contents

Introduction to Ethical Disclosure
Ethics of Ethical Hacking
Ethical Hacking and the Legal System
Proper and Ethical Disclosure
Penetration Testing and Tools
Using Metasploit
Using the BackTrack LiveCD Linux Distribution
Exploits 101
Programming Survival Skills
Basic Linux Exploits
Advanced Linux Exploits
Shellcode Strategies
Writing Linux Shellcode
Basic Windows Exploits
Vulnerability Analysis
Passive Analysis
Advanced Static Analysis with IDA Pro
Advanced Reverse Engineering
Client-Side Browser Exploits
Exploiting Windows Access Control Model for Local Elevation of Privilege
Intelligent Fuzzing with Sulley
From Vulnerability to Exploit
Closing the Holes: Mitigation
Malware Analysis
Collecting Malware and Initial Analysis
Hacking Malware
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program