Results 1 to 5 of 5

Thread: [PDF] Gray Hat Hacking, Second Edition

  1. #1
    Jedi Global Moderator Gen0TypE's Avatar
    Join Date
    Jan 2008
    Location
    Khonkaen
    Posts
    312





    Table of contents

    Part I: Introduction to Ethical Disclosure
    Chapter 1. Ethics of Ethical Hacking
    Chapter 2. Ethical Hacking and the Legal System
    Chapter 3. Proper and Ethical Disclosure

    Part II: Penetration Testing and Tools
    Chapter 4. Using Metasploit
    Chapter 5. Using the BackTrack LiveCD Linux Distribution

    Part III: Exploits 101
    Chapter 6. Programming Survival Skills
    Chapter 7. Basic Linux Exploits
    Chapter 8. Advanced Linux Exploits
    Chapter 9. Shellcode Strategies
    Chapter 10. Writing Linux Shellcode
    Chapter 11. Basic Windows Exploits

    Part IV: Vulnerability Analysis
    Chapter 12. Passive Analysis
    Chapter 13. Advanced Static Analysis with IDA Pro
    Chapter 14. Advanced Reverse Engineering
    Chapter 15. Client-Side Browser Exploits
    Chapter 16. Exploiting Windows Access Control Model for Local Elevation of Privilege
    Chapter 17. Intelligent Fuzzing with Sulley
    Chapter 18. From Vulnerability to Exploit
    Chapter 19. Closing the Holes: Mitigation

    Part V: Malware Analysis
    Chapter 20. Collecting Malware and Initial Analysis
    Chapter 21. Hacking Malware[/b]

    **Hidden Content: To see this hidden content your post count must be 15 or greater.**

  2. #2
    Junior Member
    Join Date
    May 2009
    Posts
    4


    E-Book นี้จะเป็นเนื้อหาที่เกี่ยวข้องกับด้าน Ethical Hacking ซึ่งเนื้อหาหลัก และรายละเอียดดังนี้ Download
    **Hidden Content: To see this hidden content your post count must be 30 or greater.**
    Part I Introduction to Ethical Disclosure
    Chapter 1 Ethics of Ethical Hacking
    Chapter 2 Ethical Hacking and the Legal System
    Chapter 3 Proper and Ethical Disclosure
    Part II Penetration Testing and Tools
    Chapter 4 Using Metasploit
    Chapter 5 Using the BackTrack LiveCD Linux Distribution
    Part III Exploits 101
    Chapter 6 Programming Survival Skills
    Chapter 7 Basic Linux Exploits
    Chapter 8 Advanced Linux Exploit
    Chapter 9 Shellcode Strategies
    Chapter 10 Writing Linux Shellcode
    Chapter 11 Basic Windows Exploits
    Part IV Vulnerability Analysis
    Chapter 12 Passive Analysis
    Chapter 13 Advanced Static Analysis with IDA Pro
    Chapter 14 Advanced Reverse Engineering
    Chapter 15 Client-Side Browser Exploits
    Chapter 16 Exploiting Windows Access Control Model for
    Local Elevation of Privilege
    Chapter 17 Intelligent Fuzzing with Sulley
    Chapter 18 From Vulnerability to Exploit
    Chapter 19 Closing the Holes: Mitigation
    Part V Malware Analysis
    Chapter 20 Collecting Malware and Initial Analysis
    Chapter 21 Hacking Malware

Similar Threads

  1. Gray Hat Hacking, Second Edition
    By tuxkula in forum World Hacking Ebook
    Replies: 0
    Last Post: 11-05-2009, 03:51 PM
  2. Replies: 0
    Last Post: 12-09-2007, 05:49 PM
  3. Replies: 0
    Last Post: 09-09-2007, 02:33 AM
  4. Hacking the TiVo, 2nd Edition
    By newsbot in forum World Hacking Ebook
    Replies: 0
    Last Post: 05-01-2006, 10:35 PM
  5. Gray Hat Hacking : The Ethical Hacker's Handbook
    By newsbot in forum World Hacking Ebook
    Replies: 0
    Last Post: 05-01-2006, 10:35 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •