Gray Hat Hacking Second Edition
PDF 577 pages 8.08(rar)
CONTENTS AT A GLANCE
Part I Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure .
Part II Penetration Testing and Tools .
Chapter 4 Using Metasploit
Chapter 5 Using the BackTrack LiveCD Linux Distribution
Part III Exploits 101
Chapter 6 Programming Survival Skills
Chapter 7 Basic Linux Exploits
Chapter 8 Advanced Linux Exploits
Chapter 9 Shellcode Strategies
Chapter 10 Writing Linux Shellcode
Chapter 11 Basic Windows Exploits
Part IV Vulnerability Analysis
Chapter 12 Passive Analysis
Chapter 13 Advanced Static Analysis with IDA Pro
Chapter 14 Advanced Reverse Engineering
Chapter 15 Client-Side Browser Exploits
Chapter 16 Exploiting Windows Access Control Model for Local Elevation of Privilege
Chapter 17 Intelligent Fuzzing with Sulley
Chapter 18 From Vulnerability to Exploit
Chapter 19 Closing the Holes: Mitigation
Part V Malware Analysis
Chapter 20 Collecting Malware and Initial Analysis
Chapter 21 Hacking Malware
No comments:
Post a Comment