Regalado / Harris / Harper | Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition | Buch | 978-0-07-183238-0 | sack.de

Buch, Englisch, 656 Seiten, Format (B × H): 185 mm x 229 mm, Gewicht: 941 g

Regalado / Harris / Harper

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Buch, Englisch, 656 Seiten, Format (B × H): 185 mm x 229 mm, Gewicht: 941 g

ISBN: 978-0-07-183238-0
Verlag: McGraw-Hill Education


Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource. - Build and launch spoofing exploits with Ettercap and Evilgrade - Induce error conditions and crash software using fuzzers - Hack Cisco routers, switches, and network hardware - Use advanced reverse engineering to exploit Windows and Linux software - Bypass Windows Access Control and memory protection schemes - Scan for flaws in Web applications using Fiddler and the x5 plugin - Learn the use-after-free technique used in recent zero days - Bypass Web authentication via MySQL type conversion and MD5 injection attacks - Inject your shellcode into a browser's memory using the latest Heap Spray techniques - Hijack Web browsers with Metasploit and the BeEF Injection Framework - Neutralize ransomware before it takes control of your desktop - Dissect Android malware with JEB and DAD decompilers - Find one-day vulnerabilities with binary diffing
Regalado / Harris / Harper Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition jetzt bestellen!

Weitere Infos & Material


Part I:Law & Ethics1: Ethical Hacking and the Legal SystemPart II: Crash Course: Preparing for the War2 Programming Survival Skill3 Passive Analysis4 Advanced Reverse Engineering with IDA Pro 5 Intelligent Fuzzing 6 Shellcode Strategies7 Writing Linux ShellcodePart III: From Vulnerability to Exploit8: Spoofing Based Attacks9: Exploiting Cisco Routers 10: Basic Linux Exports 11: Advanced Linux Exploits 12: Bypassing Windows Memory Protections 13: Exploiting the Windows Access Control Model 14: Exploiting Web Applications 15: Bypassing Adobe Sandbox 16: Client-Side Browser Exploits17: Exploiting Mobile Devices Part IV: Automated Exploitation18: Advanced Client-side Exploitation with BeEF19: Metasploit to the Next Level20: Commercial Exploit Frameworks AnalysisPart V: Advanced Malware Analysis21: Dissecting Stuxnet22: Dissecting Android Malware23: Dissecting Blackhole Exploit Kit24: Analyzing 64-bit Malware25: Dissecting Kernel-mode Rootkit


Spasojevic, Branko
Branko Spasojevic is a senior software engineer at Symantec.

Daniel Regalado, aka Danux, CISSP®, OSCP, OSCE, CREA, is a senior malware and vulnerability researcher at FireEye.Shon Harris, CISSP, was the CEO and founder of Logical Security.Allen Harper, CISSP, PCI QSA, is the executive vice president of Tangible Security.Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School.Jonathan Ness, CHFI™, is a lead software security engineer in Microsoft’s Security Response Center.Branko Spasojevic is a security engineer at Google.Ryan Linn, CISSP, CSSLP®, OSCE, is a managing consultant working on network penetration testing.Stephen Sims is a senior instructor and course author with the SANS Institute.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.