lgli/Daniel Regalado & Shon Harris & Ryan Linn [Regalado, Daniel & Harris, Shon & Linn, Ryan] - Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition (2015, McGraw-Hill Education).pdf
Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition 🔍
Daniel Regalado & Shon Harris & Ryan Linn [Regalado, Daniel & Harris, Shon & Linn, Ryan]
McGraw-Hill School Education Group, McGraw Hill LLC Professional Division, [N.p.], 2015
英语 [en] · PDF · 33.8MB · 2015 · 📘 非小说类图书 · 🚀/lgli/zlib · Save
描述
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.Build and launch spoofing exploits with Ettercap and EvilgradeInduce error conditions and crash software using fuzzersHack Cisco routers, switches, and network hardwareUse advanced reverse engineering to exploit Windows and Linux softwareBypass Windows Access Control and memory protection schemesScan for flaws in Web applications using Fiddler and the x5 pluginLearn the use-after-free technique used in recent zero daysBypass Web authentication via MySQL type conversion and MD5 injection attacksInject your shellcode into a browser's memory using the latest Heap Spray techniquesHijack Web browsers with Metasploit and the BeEF Injection FrameworkNeutralize ransomware before it takes control of your desktopDissect Android malware with JEB and DAD decompilersFind one-day vulnerabilities with binary diffing**About the AuthorDaniel Regalado, aka Danux, CISSP®, OSCP, OSCE, CREA, is a senior malware and vulnerability researcher at FireEye.Shon Harris, CISSP, was the CEO and founder of Logical Security.Allen Harper, CISSP, PCI QSA, is the executive vice president of Tangible Security.Chris Eagle is a senior lecturer in the Computer Science Department at the Naval Postgraduate School.Jonathan Ness, CHFITM, is a lead software security engineer in Microsoft’s Security Response Center.Branko Spasojevic is a security engineer at Google.Ryan Linn, CISSP, CSSLP®, OSCE, is a managing consultant working on network penetration testing.Stephen Sims is a senior instructor and course author with the SANS Institute.
备用文件名
zlib/Computers/Networking/Daniel Regalado & Shon Harris & Ryan Linn [Regalado, Daniel & Harris, Shon & Linn, Ryan]/Gray Hat Hacking the Ethical Hacker's Handbook, Fourth Edition_14187724.pdf
备选作者
Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims, Linda Martinez, Michael Baucom
备选作者
Regalado, Daniel, Harris, Shon, Harper, Allen, Eagle, Chris, Ness, Jonathan, Spasojevic, Branko, Linn, Ryan, Sims, Stephen
备用出版商
Irwin Professional Publishing
备用出版商
McGraw-Hill Osborne Media
备用出版商
McGraw Hill LLC
备用出版商
Oracle Press
备用版本
Fourth edition, New York, New York, 2015
备用版本
United States, United States of America
备用版本
Jan 05, 2015
备用版本
4, 2015
备用描述
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook , Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.
Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing
备用描述
This fourth edition explains the enemy's current weapons, skills, and tactics, and offers field-tested remedies, case studies, and ready-to-deploy testing labs. You will learn how to build and launch spoofing exploits with Ettercap and Evilgrade; induce error conditions and crash software using fuzzers; hack Cisco routers, switches, and network hardware; use advanced reverse engineering to exploit Windows and Linux software; bypass Windows Access Control and memory protection schemes; scan for flaws in Web applications; utilize use-after-free technique used in recent zero days; bypass Web authentication; inject your shellcode into a browser's memory using the latest Heap Spray techniques; hijack Web browsers with Metasploit and the BeEF Injection Framework; neutralize ransomware before it takes control of your desktop; dissect Android malware with JEB and DAD decompilers; and find one-day vulnerabilities with binary diffing. -- Edited summary from book
备用描述
Fully updated throughout and featuring 13 entirely new chapters, the new edition of this bestseller offers in-depth, advanced coverage of the latest strategies for vulnerability discovery and exploitation, mobile security, malware analysis, and reverse engineering
备用描述
An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures
开源日期
2021-05-19
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.