Cover image for Gray hat hacking : the ethical hacker's handbook
Gray hat hacking : the ethical hacker's handbook
Title:
Gray hat hacking : the ethical hacker's handbook
Author:
Regalado, Daniel.
ISBN:
9780071832380
Edition:
Fourth edition.
Publication Information:
New York : McGraw-Hill Education, c2015.
Physical Description:
xxix, 625 p. : ill. ; 24 cm
Abstract:
An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures.

Part 1. Crash course : preparing for the war. Ethical hacking and the legal system -- Programming survival skills -- Static analysis -- Advanced analysis with IDA Pro -- World of fuzzing -- Shellcode strategies -- Writing Linux shellcode -- Part 2. From vulnerability to exploit. Spoofing-based attacks -- Exploiting Cisco routers -- Basic Linux exploits -- Advanced Linux exploits -- Windows exploits -- Bypassing Windows memory protections -- Exploiting the Windows Access Control model -- Exploiting web applications -- Exploiting IE : smashing the heap -- Exploiting IE : use-after-free technique -- Advanced client-side exploitation with BeEF -- One-day exploitation with patch diffing -- Part 3. Advanced malware analysis. Dissecting Androis malware -- Dissecting ransomware -- Analyzing 64-bit malware -- Next-generation reverse engineering.
Subject:
Computer security.
Hackers.
Summary:
An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures.

Part 1. Crash course : preparing for the war. Ethical hacking and the legal system -- Programming survival skills -- Static analysis -- Advanced analysis with IDA Pro -- World of fuzzing -- Shellcode strategies -- Writing Linux shellcode -- Part 2. From vulnerability to exploit. Spoofing-based attacks -- Exploiting Cisco routers -- Basic Linux exploits -- Advanced Linux exploits -- Windows exploits -- Bypassing Windows memory protections -- Exploiting the Windows Access Control model -- Exploiting web applications -- Exploiting IE : smashing the heap -- Exploiting IE : use-after-free technique -- Advanced client-side exploitation with BeEF -- One-day exploitation with patch diffing -- Part 3. Advanced malware analysis. Dissecting Androis malware -- Dissecting ransomware -- Analyzing 64-bit malware -- Next-generation reverse engineering.