Gray Hat Hacking: The Ethical Hacker's Handbook
暫譯: 灰帽駭客:道德駭客手冊
Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Michael Lester
- 出版商: McGraw-Hill Education
- 出版日期: 2004-11-09
- 售價: $1,790
- 貴賓價: 9.5 折 $1,701
- 語言: 英文
- 頁數: 434
- 裝訂: Paperback
- ISBN: 0072257091
- ISBN-13: 9780072257090
-
相關分類:
Penetration-test
已過版
買這商品的人也買了...
-
$980$774 -
$1,100$1,078 -
$480$379 -
$590$466 -
$680$537 -
$560$476 -
$580$458 -
$2,210$2,100 -
$850$723 -
$480$379 -
$750$593 -
$490$382 -
$890$703 -
$675LPIC 1 Exam Cram 2: Linux Professional Institute Certification Exams 101 and 102 (Paperback)
-
$2,210$2,100 -
$650$553 -
$480$408 -
$650$507 -
$680$578 -
$520$406 -
$680$578 -
$620$527 -
$860$679 -
$390$332 -
$650$507
商品描述
Description:
Analyze your company’s vulnerability to hacks with expert guidance from Gray Hat Hacking: The Ethical Hacker’s Handbook. Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" position.
Table of Contents:
Part I: Introduction to Ethical Disclosure
Chapter 1: Ethics of Ethical Hacking
Chapter 2: Ethical Hacking and the Legal System
Chapter 3: Proper and Ethical Disclosure
Part II: Penetration Testing and Tools
Chapter 4: Pen-Testing Process
Chapter 5: Beyond Hacking Exposed: Advanced Tools for Today’s Hacker
Chapter 6: Automated Penetration Testing
Part III: Exploits
Chapter 7: Programming Survival Skills
Chapter 8: Basic Linux Exploits
Chapter 9: Advance Linux Exploits
Chapter 10: Writing Linux Shellcode
Chapter 11: Writing a Basic Windows Exploit
Part IV: Vulnerability Analysis
Chapter 12: Passive Analysis
Chapter 13: Advanced Reverse Engineering
Chapter 14: From Vulnerability to Exploit
Chapter 15: Closing the Holes: Mitigation
商品描述(中文翻譯)
**描述:**
分析您公司對駭客攻擊的脆弱性,並獲得來自《Gray Hat Hacking: The Ethical Hacker’s Handbook》的專家指導。探索模糊測試、逆向工程和二進位掃描等先進安全工具和技術。使用被動和主動的脆弱性分析來測試系統。學習如何利用您作為灰帽駭客的角色。回顧倫理和法律問題以及案例研究。這本獨特的資源提供了頂尖網路工程師、安全審計員、程式設計師和脆弱性評估員所使用的前沿技術資訊。此外,本書深入探討倫理披露,並為那些處於「披露決策」位置的人提供實用的行動方案。
**目錄:**
第一部分:倫理披露介紹
第1章:倫理駭客的倫理
第2章:倫理駭客與法律系統
第3章:正確和倫理的披露
第二部分:滲透測試與工具
第4章:滲透測試過程
第5章:超越駭客曝光:今日駭客的進階工具
第6章:自動化滲透測試
第三部分:漏洞利用
第7章:程式設計生存技能
第8章:基本Linux漏洞利用
第9章:進階Linux漏洞利用
第10章:撰寫Linux Shellcode
第11章:撰寫基本Windows漏洞利用
第四部分:脆弱性分析
第12章:被動分析
第13章:進階逆向工程
第14章:從脆弱性到漏洞利用
第15章:封閉漏洞:減輕措施