Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionMcGraw Hill Professional, 5 févr. 2011 - 720 pages THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.
|
Avis des internautes - Rédiger un commentaire
Aucun commentaire n'a été trouvé aux emplacements habituels.
Table des matières
Penetration Testing and Tools | 75 |
Exploiting | 171 |
Vulnerability Analysis | 411 |
Droits d'auteur | |
2 autres sections non affichées
Expressions et termes fréquents
ActiveX analysis application attack BackTrack binary breakpoint BT book buffer overflow bytes chapter char client-side command compiled configuration crash create DACL database debugger default encoded example execute exploit Figure flaw format string function fuzzer fuzzing hacker hacking input install Internet JavaScript Linux loaded machine malicious malware memory Metasploit Meterpreter Microsoft Modbus NOTENOTE NULL objdump object OllyDbg opcode operating system option output overwrite parameter password patch payload penetration test plug-in pointer port printf protection protocol push References registry RETN return address SCADA script Segmentation fault server shell shellcode simple socket source code SQL injection stack strcpy target tion Valgrind variable vendor VirtualBox VMware VoIP vulnerability Windows Windows XP
