35986841_10216840653711318_1105697261150535680_n
Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Gray hat hacking : the ethical hacker's handbook / Daniel Regalado [and 7 others].

By: Contributor(s): Material type: TextTextPublication details: New York : McGraw-Hill Education, 2015Edition: Fourth editionDescription: 1 online resource (1 volume) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780071838504
  • 0071838503
Other title:
  • Ethical hacker's handbook
Subject(s): Genre/Form: Additional physical formats: Print version :: Gray hat hacking.DDC classification:
  • 005.8
LOC classification:
  • QA76.9.A25
Online resources: Summary: This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. --
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books Centeral Library Second Floor - Computer Sciences 005.8 R.D.G 2015 (Browse shelf(Opens below)) Available 23989

Includes bibliographical references and index.

Available to OhioLINK libraries.

This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. --

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image