Gray Hat Hacking, Second Edition

Gray Hat Hacking, Second Edition(2007)

引用 23|浏览6
暂无评分
摘要
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, HackerTable of contentsPart I: Introduction to Ethical DisclosureChapter 1. Ethics of Ethical HackingChapter 2. Ethical Hacking and the Legal SystemChapter 3. Proper and Ethical DisclosurePart II: Penetration Testing and ToolsChapter 4. Using MetasploitChapter 5. Using the BackTrack LiveCD Linux DistributionPart III: Exploits 101Chapter 6. Programming Survival SkillsChapter 7. Basic Linux ExploitsChapter 8. Advanced Linux ExploitsChapter 9. Shellcode StrategiesChapter 10. Writing Linux ShellcodeChapter 11. Basic Windows ExploitsPart IV: Vulnerability AnalysisChapter 12. Passive AnalysisChapter 13. Advanced Static Analysis with IDA ProChapter 14. Advanced Reverse EngineeringChapter 15. Client-Side Browser ExploitsChapter 16. Exploiting Windows Access Control Model for Local Elevation of PrivilegeChapter 17. Intelligent Fuzzing with SulleyChapter 18. From Vulnerability to ExploitChapter 19. Closing the Holes: MitigationPart V: Malware AnalysisChapter 20. Collecting Malware and Initial AnalysisChapter 21. Hacking MalwareIndex
更多
查看译文
关键词
advanced linux exploitschapter,second edition,initial analysischapter,ethical hackingchapter,gray hat hacking,ethical hacking,basic linux exploitschapter,backtrack livecd linux distributionpart,malware analysischapter,ethical disclosurechapter,linux shellcodechapter,ethical disclosurepart ii
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要