Gray Hat Hacking, Second Edition (Paperback), Dec.2007.eBook-BBL

本书全面更新,覆盖黑客最新攻击手段,详细介绍了如何通过暴露并修复安全漏洞来预防网络攻击。书中包含渗透测试、使用模糊测试工具和嗅探器、逆向工程等实战技巧,并提供了法律合规的漏洞发现与报告流程。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

McGraw.Hill.Gray.Hat.Hacking.2nd.Edition.Dec.2007.eBook-BBL

IPB Image

TITLE : Gray Hat Hacking, Second Edition (Paperback)
AUTHOR : by Shon Harris (Author), Allen Harper (Author), Chris Eagle (Author), Jonathan Ness (Author)
PUBLISHER : McGraw-Hill publisher
ISBN : 0071495681
EDITION : 2nd
PUB DATE : December 20, 2007
LANGUAGE : English
RLS DATE : 02/24/2008

MAKER : BBL
SUPPLIER : BBL
PACKAGER : BBL
FORMAT : PDF
SIZE : 03 x 2.88 MB

[ R e l e a s e N o t e s ]

Prevent catastrophic network attacks by exposing security flaws, fixing
them, and ethically reporting them to the software author. Fully
expanded to cover the hacker's latest devious methods, Gray Hat Hacking:
The Ethical Hacker's Handbook, Second Edition lays out each exploit
alongside line-by-line code samples, detailed countermeasures, and moral
disclosure procedures. Find out how to execute effective penetration
tests, use fuzzers and sniffers, perform reverse engineering, and find
security holes in Windows and Linux applications. You'll also learn how
to trap and autopsy stealth worms, viruses, rootkits, adware, and
malware.

- Implement vulnerability testing, discovery, and reporting procedures
that comply with applicable laws
- Learn the basics of programming, stack operations, buffer overflow
and heap vulnerabilities, and exploit development
- Test and exploit systems using Metasploit and other tools
- Break in to Windows and Linux systems with perl scripts, Python
scripts, and customized C programs
- Analyze source code using ITS4, RATS, FlawFinder, PREfast, Splint,
and decompilers
- Understand the role of IDA Pro scripts, FLAIR tools, and third-party
plug-ins in discovering software vulnerabilities
- Reverse-engineer software using decompiling, profiling, memory
monitoring, and data flow analysis tools
- Reveal client-side web browser vulnerabilities with MangleMe, AxEnum,
and AxMan
- Probe Windows Access Controls to discover insecure access tokens,
security descriptors, DACLs, and ACEs
- Find and examine malware and rootkits using honeypots, honeynets, and
Norman SandBox technology

URL: http://www.amazon.com/exec/obidos/tg/detail/-/0071495681/

Download:

http://depositfiles.com/files/3794305


Mirror Download:

http://rapidshare.com/files/95109966/0071495681.zip
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值