Book description
"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group
"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker
Table of contents
- Copyright
- Preface
- Acknowledgments
- Introduction
- Introduction to Ethical Disclosure
-
Penetration Testing and Tools
- Using Metasploit
-
Using the BackTrack LiveCD Linux Distribution
- BackTrack: The Big Picture
- Creating the BackTrack CD
- Booting BackTrack
- Exploring the BackTrack X-Windows Environment
- Writing BackTrack to Your USB Memory Stick
- Saving Your BackTrack Configurations
- Creating a Directory-Based or File-Based Module with dir2lzm
- Creating a New Base Module with All the Desired Directory Contents
- Cheat Codes and Selectively Loading Modules
- Metasploit db_autopwn
- Tools
- Exploits 101
-
Vulnerability Analysis
- Passive Analysis
- Advanced Static Analysis with IDA Pro
- Advanced Reverse Engineering
- Client-Side Browser Exploits
-
Exploiting Windows Access Control Model for Local Elevation of Privilege
- Why Access Control Is Interesting to a Hacker
- How Windows Access Control Works
- Tools for Analyzing Access Control Configurations
- Special SIDs, Special Access, and “Access Denied”
- Analyzing Access Control for Elevation of Privilege
- Attack Patterns for Each Interesting Object Type
- What Other Object Types Are out There?
- Intelligent Fuzzing with Sulley
- From Vulnerability to Exploit
- Closing the Holes: Mitigation
- Malware Analysis
- Index
Product information
- Title: Gray Hat Hacking, Second Edition, 2nd Edition
- Author(s):
- Release date: January 2008
- Publisher(s): McGraw-Hill
- ISBN: 9780071595537
You might also like
video
Advanced White Hat Hacking and Penetration Testing
In this Advanced White Hat Hacking And Penetration Testing training course, expert author Ric Messier takes …
book
An Introduction to Hacking and Crimeware
Defend your business, protect your livelihood, safeguard your future. Cybercrime is on the rise. Unchecked, it …
video
White Hat Hacking and Penetration Testing
In this Ethical Hacking - White Hat Hacking and Penetration testing training course, expert Ric Messier …
book
Hack Proofing Your Network, 2nd Edition
A new edition the most popular Hack Proofing book around! IT professionals who want to run …