Coverart for item
The Resource Gray hat hacking : the ethical hacker's handbook, Shon Harris [and others]

Gray hat hacking : the ethical hacker's handbook, Shon Harris [and others]

Label
Gray hat hacking : the ethical hacker's handbook
Title
Gray hat hacking
Title remainder
the ethical hacker's handbook
Statement of responsibility
Shon Harris [and others]
Contributor
Subject
Genre
Language
eng
Summary
A thorough revision of the bestselling guide to the tools and tricks of the hybrid hacker. Written by seasoned security authors and instructors, this fully updated volume offers a comprehensive overview of today's hacking and computer security landscape
Member of
Cataloging source
N$T
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
G743 2008eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Harris, Shon
http://library.link/vocab/subjectName
  • Computer security
  • Hackers
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Hackers
  • Computer security
  • Computer security
  • Computer hackers
Label
Gray hat hacking : the ethical hacker's handbook, Shon Harris [and others]
Instantiates
Publication
Note
Title from PDF title page (viewed Feb. 14, 2008)
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cover -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Introduction to Ethical Disclosure -- Chapter 1 Ethics of Ethical Hacking -- How Does This Stuff Relate to an Ethical Hacking Book? -- Security Does Not Like Complexity -- Chapter 2 Ethical Hacking and the Legal System -- Addressing Individual Laws -- Chapter 3 Proper and Ethical Disclosure -- You Were Vulnerable for How Long? -- Different Teams and Points of View -- CERT's Current Process -- Full Disclosure Policy (RainForest Puppy Policy) -- Organization for Internet Safety (OIS) -- Conflicts Will Still Exist -- Case Studies -- Zero Day Initiative -- So What Should We Do from Here on Out? -- Part II: Penetration Testing and Tools -- Chapter 4 Using Metasploit -- Metasploit: The Big Picture -- Getting Metasploit -- Exploiting Client-Side Vulnerabilities with Metasploit -- Using Metasploit as a Man-in-the-Middle Password Stealer -- Using Metasploit to Auto-Attack -- Inside Metasploit Modules -- Chapter 5 Using the BackTrack LiveCD Linux Distribution -- BackTrack: The Big Picture -- Creating the BackTrack CD -- Booting BackTrack -- Exploring the BackTrack X-Windows Environment -- Writing BackTrack to Your USB Memory Stick -- Saving Your BackTrack Configurations -- Creating a Directory-Based or File-Based Module with dir2lzm -- Creating a New Base Module with All the Desired Directory Contents -- Cheat Codes and Selectively Loading Modules -- Metasploit db_autopwn -- Tools -- Part III: Exploits 101 -- Chapter 6 Programming Survival Skills -- C Programming Language -- Computer Memory -- Intel Processors -- Assembly Language Basics -- Debugging with gdb -- Python Survival Skills -- Chapter 7 Basic Linux Exploits -- Stack Operations -- Buffer Overflows -- Local Buffer Overflow Exploits -- Exploit Development Process -- Chapter 8 Advanced Linux Exploits -- Format String Exploits -- Heap Overflow Exploits -- Memory Protection Schemes -- Chapter 9 Shellcode Strategies -- User Space Shellcode -- Other Shellcode Considerations -- Kernel Space Shellcode -- Chapter 10 Writing Linux Shellcode -- Basic Linux Shellcode -- Implementing Port-Binding Shellcode -- Implementing Reverse Connecting Shellcode -- Encoding Shellcode -- Automating Shellcode Generation with Metasploit -- Chapter 11 Basic Windows Exploits -- Compiling and Debugging Windows Programs -- Windows Exploits -- Part IV: Vulnerability Analysis -- Chapter 12 Passive Analysis -- Ethical Reverse Engineering -- Why Reverse Engineering? -- Source Code Analysis -- Binary Analysis -- Chapter 13 Advanced Static Analysis with IDA Pro -- Static Analysis Challenges -- Extending IDA -- Chapter 14 Advanced Reverse Engineering -- Why Try to Break Software? -- The Software Development Process -- Instrumentation Tools -- Fuzzing -- Instrumented Fuzzing Tools and Techniques -- Chapter 15 Client-Side Browser Exploits -- Why Client-Side Vulnerabilities Are Interesting -- Internet Explorer Security Concepts -- History of Client-Side Exploits and Latest Trends -- Finding New Browser-Based Vulnerabilities -- Heap Spray to Exploit -- Protecting Yourself from Client-Side Exp
Control code
192020173
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9780071495684
Lccn
2007047838
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
be0e4d1f-ae34-4eb8-b3ea-daf97ca3e54a
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)192020173
Label
Gray hat hacking : the ethical hacker's handbook, Shon Harris [and others]
Publication
Note
Title from PDF title page (viewed Feb. 14, 2008)
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cover -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Introduction to Ethical Disclosure -- Chapter 1 Ethics of Ethical Hacking -- How Does This Stuff Relate to an Ethical Hacking Book? -- Security Does Not Like Complexity -- Chapter 2 Ethical Hacking and the Legal System -- Addressing Individual Laws -- Chapter 3 Proper and Ethical Disclosure -- You Were Vulnerable for How Long? -- Different Teams and Points of View -- CERT's Current Process -- Full Disclosure Policy (RainForest Puppy Policy) -- Organization for Internet Safety (OIS) -- Conflicts Will Still Exist -- Case Studies -- Zero Day Initiative -- So What Should We Do from Here on Out? -- Part II: Penetration Testing and Tools -- Chapter 4 Using Metasploit -- Metasploit: The Big Picture -- Getting Metasploit -- Exploiting Client-Side Vulnerabilities with Metasploit -- Using Metasploit as a Man-in-the-Middle Password Stealer -- Using Metasploit to Auto-Attack -- Inside Metasploit Modules -- Chapter 5 Using the BackTrack LiveCD Linux Distribution -- BackTrack: The Big Picture -- Creating the BackTrack CD -- Booting BackTrack -- Exploring the BackTrack X-Windows Environment -- Writing BackTrack to Your USB Memory Stick -- Saving Your BackTrack Configurations -- Creating a Directory-Based or File-Based Module with dir2lzm -- Creating a New Base Module with All the Desired Directory Contents -- Cheat Codes and Selectively Loading Modules -- Metasploit db_autopwn -- Tools -- Part III: Exploits 101 -- Chapter 6 Programming Survival Skills -- C Programming Language -- Computer Memory -- Intel Processors -- Assembly Language Basics -- Debugging with gdb -- Python Survival Skills -- Chapter 7 Basic Linux Exploits -- Stack Operations -- Buffer Overflows -- Local Buffer Overflow Exploits -- Exploit Development Process -- Chapter 8 Advanced Linux Exploits -- Format String Exploits -- Heap Overflow Exploits -- Memory Protection Schemes -- Chapter 9 Shellcode Strategies -- User Space Shellcode -- Other Shellcode Considerations -- Kernel Space Shellcode -- Chapter 10 Writing Linux Shellcode -- Basic Linux Shellcode -- Implementing Port-Binding Shellcode -- Implementing Reverse Connecting Shellcode -- Encoding Shellcode -- Automating Shellcode Generation with Metasploit -- Chapter 11 Basic Windows Exploits -- Compiling and Debugging Windows Programs -- Windows Exploits -- Part IV: Vulnerability Analysis -- Chapter 12 Passive Analysis -- Ethical Reverse Engineering -- Why Reverse Engineering? -- Source Code Analysis -- Binary Analysis -- Chapter 13 Advanced Static Analysis with IDA Pro -- Static Analysis Challenges -- Extending IDA -- Chapter 14 Advanced Reverse Engineering -- Why Try to Break Software? -- The Software Development Process -- Instrumentation Tools -- Fuzzing -- Instrumented Fuzzing Tools and Techniques -- Chapter 15 Client-Side Browser Exploits -- Why Client-Side Vulnerabilities Are Interesting -- Internet Explorer Security Concepts -- History of Client-Side Exploits and Latest Trends -- Finding New Browser-Based Vulnerabilities -- Heap Spray to Exploit -- Protecting Yourself from Client-Side Exp
Control code
192020173
Dimensions
unknown
Edition
2nd ed.
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9780071495684
Lccn
2007047838
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
be0e4d1f-ae34-4eb8-b3ea-daf97ca3e54a
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)192020173

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...