PDA

View Full Version : [PDF] Gray Hat Hacking, Second Edition



Gen0TypE
10-04-2008, 12:38 AM
http://pic.citecclub.org/out.php/i3246_grayhatcover.jpg


Table of contents

Part I: Introduction to Ethical Disclosure
Chapter 1. Ethics of Ethical Hacking
Chapter 2. Ethical Hacking and the Legal System
Chapter 3. Proper and Ethical Disclosure

Part II: Penetration Testing and Tools
Chapter 4. Using Metasploit
Chapter 5. Using the BackTrack LiveCD Linux Distribution

Part III: Exploits 101
Chapter 6. Programming Survival Skills
Chapter 7. Basic Linux Exploits
Chapter 8. Advanced Linux Exploits
Chapter 9. Shellcode Strategies
Chapter 10. Writing Linux Shellcode
Chapter 11. Basic Windows Exploits

Part IV: Vulnerability Analysis
Chapter 12. Passive Analysis
Chapter 13. Advanced Static Analysis with IDA Pro
Chapter 14. Advanced Reverse Engineering
Chapter 15. Client-Side Browser Exploits
Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege
Chapter 17. Intelligent Fuzzing with Sulley
Chapter 18. From Vulnerability to Exploit
Chapter 19. Closing the Holes: Mitigation

Part V: Malware Analysis
Chapter 20. Collecting Malware and Initial Analysis
Chapter 21. Hacking Malware[/b]


**Hidden Content: Check the thread to see hidden data.**

ZERO
23-01-2010, 01:55 AM
E-Book นี้จะเป็นเนื้อหาที่เกี่ยวข้องกับด้าน Ethical Hacking ซึ่งเนื้อหาหลัก และรายละเอียดดังนี้ Download
**Hidden Content: Check the thread to see hidden data.**Part I Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure
Part II Penetration Testing and Tools
Chapter 4 Using Metasploit
Chapter 5 Using the BackTrack LiveCD Linux Distribution
Part III Exploits 101
Chapter 6 Programming Survival Skills
Chapter 7 Basic Linux Exploits
Chapter 8 Advanced Linux Exploit
Chapter 9 Shellcode Strategies
Chapter 10 Writing Linux Shellcode
Chapter 11 Basic Windows Exploits
Part IV Vulnerability Analysis
Chapter 12 Passive Analysis
Chapter 13 Advanced Static Analysis with IDA Pro
Chapter 14 Advanced Reverse Engineering
Chapter 15 Client-Side Browser Exploits
Chapter 16 Exploiting Windows Access Control Model for
Local Elevation of Privilege
Chapter 17 Intelligent Fuzzing with Sulley
Chapter 18 From Vulnerability to Exploit
Chapter 19 Closing the Holes: Mitigation
Part V Malware Analysis
Chapter 20 Collecting Malware and Initial Analysis
Chapter 21 Hacking Malware