Gray Hat Hacking The Ethical Hacker's Handbook; Harper Allen, Chris Eagle, Ness Jonathan, Harris Shon, Spasojevic Branko, Regalado Daniel, Linn Ryan, Sims Stephen; 2014

Gray Hat Hacking The Ethical Hacker's Handbook Upplaga 4

av Harper Allen, Chris Eagle, Ness Jonathan, Harris Shon, Spasojevic Branko
m.fl.
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

Build and launch spoofing exploits with Ettercap and EvilgradeInduce error conditions and crash software using fuzzersHack Cisco routers, switches, and network hardwareUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesScan for flaws in Web applications using Fiddler and the x5 pluginLearn the use-after-free technique used in recent zero daysBypass Web authentication via MySQL type conversion and MD5 injection attacksInject your shellcode into a browser's memory using the latest Heap Spray techniquesHijack Web browsers with Metasploit and the BeEF Injection FrameworkNeutralize ransomware before it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffing
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

Build and launch spoofing exploits with Ettercap and EvilgradeInduce error conditions and crash software using fuzzersHack Cisco routers, switches, and network hardwareUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesScan for flaws in Web applications using Fiddler and the x5 pluginLearn the use-after-free technique used in recent zero daysBypass Web authentication via MySQL type conversion and MD5 injection attacksInject your shellcode into a browser's memory using the latest Heap Spray techniquesHijack Web browsers with Metasploit and the BeEF Injection FrameworkNeutralize ransomware before it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffing
Upplaga: 4e upplagan
Utgiven: 2014
ISBN: 9780071832380
Förlag: McGraw-Hill Professional
Format: Häftad
Språk: Engelska
Sidor: 656 st
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

Build and launch spoofing exploits with Ettercap and EvilgradeInduce error conditions and crash software using fuzzersHack Cisco routers, switches, and network hardwareUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesScan for flaws in Web applications using Fiddler and the x5 pluginLearn the use-after-free technique used in recent zero daysBypass Web authentication via MySQL type conversion and MD5 injection attacksInject your shellcode into a browser's memory using the latest Heap Spray techniquesHijack Web browsers with Metasploit and the BeEF Injection FrameworkNeutralize ransomware before it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffing
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

Build and launch spoofing exploits with Ettercap and EvilgradeInduce error conditions and crash software using fuzzersHack Cisco routers, switches, and network hardwareUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesScan for flaws in Web applications using Fiddler and the x5 pluginLearn the use-after-free technique used in recent zero daysBypass Web authentication via MySQL type conversion and MD5 injection attacksInject your shellcode into a browser's memory using the latest Heap Spray techniquesHijack Web browsers with Metasploit and the BeEF Injection FrameworkNeutralize ransomware before it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffing
Begagnad bok (0 st)
Begagnad bok (0 st)