DETAIL
·
Author: Allen Harper,
Shon Harris, Jonathan Ness, Chris Eagle, Gideon Lenkey, and Terron Williams
- Language: English
- Published: 2011
- Page: 721
- Size: 12 MB
- Format: pdf
CONTENTS
Part
I Introduction to Ethical Disclosure
Chapter 1 Ethics
of Ethical Hacking
Chapter 2 Ethical
Hacking and the Legal System
Chapter 3 Proper
and Ethical Disclosure
Part
II Penetration Testing and Tools
Chapter 4 Social
Engineering Attacks
Chapter 5 Physical
Penetration Attacks
Chapter 6 Insider
Attacks
Chapter 7 Using
the BackTrack Linux Distribution
Chapter 8 Using
Metasploit
Chapter 9 Managing
a Penetration Test
Part
III Exploiting
Chapter 10 Programming
Survival Skills
Chapter 11 Basic
Linux Exploits
Chapter 12 Advanced
Linux Exploits
Chapter 13 Shellcode
Strategies
Chapter 14 Writing
Linux Shellcode
Chapter 15 Windows
Exploits
Chapter 16 Understanding
and Detecting Content-Type Attacks
Chapter 17 Web
Application Security Vulnerabilities
Chapter 18 VoIP
Attacks
Chapter 19 SCADA
Attacks
Part
IV Vulnerability Analysis
Chapter 20 Passive
Analysis
Chapter 21 Advanced
Static Analysis with IDA Pro
Chapter 22 Advanced
Reverse Engineering
Chapter 23 Client-Side
Browser Exploits
Chapter 24 Exploiting
the Windows Access Control Model
Chapter 25 Intelligent
Fuzzing with Sulley
Chapter 26 From
Vulnerability to Exploit
Chapter 27 Closing
the Holes: Mitigation
Part
V Malware Analysis
Chapter 28 Collecting
Malware and Initial Analysis
Chapter 29 Hacking
Malware
Index
No comments:
Post a Comment