35986841_10216840653711318_1105697261150535680_n

Gray hat hacking : the ethical hacker's handbook / Daniel Regalado [and 7 others].

By: Regalado, Daniel [author.]
Contributor(s): Ohio Library and Information Network
Material type: TextTextPublisher: New York : McGraw-Hill Education, 2015Edition: Fourth editionDescription: 1 online resource (1 volume) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9780071838504; 0071838503Other title: Ethical hacker's handbookSubject(s): Computer security | Hackers | HackingGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version :: Gray hat hacking.DDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Safari Books Online Connect to resource | Safari Books Online Connect to resource (off-campus) Summary: This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. --
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
Books Books Centeral Library
Second Floor - Computer Sciences
005.8 R.D.G 2015 (Browse shelf) Available 23989

Includes bibliographical references and index.

Available to OhioLINK libraries.

This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. --

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer