Skip to content

Gray Hat Hacking, Second Edition The Ethical Hacker's Handbook

Best in textbook rentals since 2012!

ISBN-10: 0071495681

ISBN-13: 9780071495684

Edition: 2nd 2008 (Revised)

Authors: Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness

List price: $49.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group"Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker
Customers also bought

Book details

List price: $49.99
Edition: 2nd
Copyright year: 2008
Publisher: McGraw-Hill Osborne
Publication date: 12/20/2007
Binding: Paperback
Pages: 550
Size: 7.50" wide x 9.25" long x 1.25" tall
Weight: 2.046
Language: English

Shon Harris, CISSP, is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Force’s Information Warfare unit, an instructor, and an author. She has authored several international bestselling books on information security published by McGraw-Hill Education and Pearson which have sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication, and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several…    

Chris Eagle (PhD, University of California, Berkeley) is Research Lecturer in the Writing and Society Research Centre at the University of Western Sydney, Australia.

Introduction to Ethical Disclosure
Ethics of Ethical Hacking
Ethical Hacking and the Legal System
Proper and Ethical Disclosure
Penetration Testing and Tools
Using Metasploit
Using the BackTrack LiveCD Linux Distribution
Exploits 101
Programming Survival Skills
Basic Linux Exploits
Advanced Linux Exploits
Shellcode Strategies
Writing Linux Shellcode
Basic Windows Exploits
Vulnerability Analysis
Passive Analysis
Advanced Static Analysis with IDA Pro
Advanced Reverse Engineering
Client-Side Browser Exploits
Exploiting Windows Access Control Model for Local Elevation of Privilege
Intelligent Fuzzing with Sulley
From Vulnerability to Exploit
Closing the Holes: Mitigation
Malware Analysis
Collecting Malware and Initial Analysis
Hacking Malware
Index
Table of Contents provided by Publisher. All Rights Reserved.