Download McGraw hill, Grey Hat Hacking 2nd edition ebook at the below link.
CONTENTS AT A GLANCE:
Part I Introduction to Ethical Disclosure . . . . . . . . . . . . . . . . 1
Chapter 1 Ethics of Ethical Hacking . . . . . . . . . . . . . . . . . . 3
Chapter 2 Ethical Hacking and the Legal System . . . . . . . . 23
Chapter 3 Proper and Ethical Disclosure . . . . . . . . . . . . . . 47
Part II Penetration Testing and Tools . . . . . . . . . . . . . . . . 75
Chapter 4 Social Engineering Attacks . . . . . . . . . . . . . . . . . 77
Chapter 5 Physical Penetration Attacks . . . . . . . . . . . . . . . . 93
Chapter 6 Insider Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 109
Chapter 7 Using the BackTrack Linux Distribution . . . . . . 125
Chapter 8 Using Metasploit . . . . . . . . . . . . . . . . . . . . . . . 141
Chapter 9 Managing a Penetration Test . . . . . . . . . . . . . . 157
Part III Exploiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
Chapter 10 Programming Survival Skills . . . . . . . . . . . . . . 173
Chapter 11 Basic Linux Exploits . . . . . . . . . . . . . . . . . . . 201
Chapter 12 Advanced Linux Exploits . . . . . . . . . . . . . . . 225
Chapter 13 Shellcode Strategies . . . . . . . . . . . . . .. . . . . 251
Chapter 14 Writing Linux Shellcode . . . . . . . . . . .. . . 267
Chapter 15 Windows Exploits . . . . . . . . . . . . . . . . . . . . 297
Chapter 16 Understanding and Detecting Content-Type Attacks . .. 341
Chapter 17 Web Application Security Vulnerabilities . . . . 361
Chapter 18 VoIP Attacks . . . .. . . . . . . . . . . . . . . . . . . . . 379
Chapter 19 SCADA Attacks . . . . . . . . . . . . . . . 395
Part IV Vulnerability Analysis . .. . . . . . . . . . . . . . . . . . . 411
Chapter 20 Passive Analysis . . . . . . . . . . . . . . . . . . . . . . 413
Chapter 21 Advanced Static Analysis with IDA Pro . . . . . . 445
Chapter 22 Advanced Reverse Engineering . . . . . . . . . . . . . 471
Chapter 23 Client-Side Browser Exploits . . . . . . . . . . .. . 495
Chapter 24 Exploiting the Windows Access Control Model . . 525
Chapter 25 Intelligent Fuzzing with Sulley . . . . . . . . . . . . . . . 579
Chapter 26 From Vulnerability to Exploit . . . . . . . . . . . . . . . 595
Chapter 27 Closing the Holes: Mitigation . . . . . . . . . . . . . 617
Part V Malware Analysis . . . . . . . . . . . . . . . . . . . . . . .. 633
Chapter 28 Collecting Malware and Initial Analysis . . .. 635
Chapter 29 Hacking Malware . . . . . . . . . . . . . . . . . . . . . 657
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
0 nhận xét