Gray Hat Hacking

Gray Hat Hacking : The Ethical Hacker's Handbook

4.15 (318 ratings by Goodreads)
By (author)  , By (author)  , By (author)  , By (author)  , By (author) 

List price: US$32.50

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


Analyze your company's vulnerability to hacks with expert guidance from "Gray Hat Hacking: The Ethical Hacker's Handbook". Discover advanced security tools and techniques such as fuzzing, reverse engineering, and binary scanning. Test systems using both passive and active vulnerability analysis. Learn to benefit from your role as a gray hat. Review ethical and legal issues and case studies. This unique resource provides leading-edge technical information being utilized by the top network engineers, security auditors, programmers, and vulnerability assessors. Plus, the book offers in-depth coverage of ethical disclosure and provides a practical course of action for those who find themselves in a "disclosure decision" more

Product details

  • Paperback | 434 pages
  • 188 x 224 x 24mm | 780.19g
  • McGraw-Hill Education - Europe
  • McGraw-Hill Publishing Co.
  • London, United Kingdom
  • English
  • w. 100 figs.
  • 0072257091
  • 9780072257090
  • 1,411,419

Table of contents

Part I: Introduction to Ethical Disclosure Chapter 1: Ethics of Ethical Hacking Chapter 2: Ethical Hacking and the Legal System Chapter 3: Proper and Ethical Disclosure Part II: Penetration Testing and Tools Chapter 4: Pen-Testing Process Chapter 5: Beyond Hacking Exposed: Advanced Tools for Today's Hacker Chapter 6: Automated Penetration Testing Part III: Exploits Chapter 7: Programming Survival Skills Chapter 8: Basic Linux Exploits Chapter 9: Advance Linux Exploits Chapter 10: Writing Linux Shellcode Chapter 11: Writing a Basic Windows Exploit Part IV: Vulnerability Analysis Chapter 12: Passive Analysis Chapter 13: Advanced Reverse Engineering Chapter 14: From Vulnerability to Exploit Chapter 15: Closing the Holes: Mitigationshow more

Review quote

Excerpts from review by Patrick Mueller ... a proficient work...offers a smorgasbord of topics geared towards moderate- and advanced-level practitioners...The authors touch on some deep technical issues, such as automated penetration testing and shellcode exploit construction...great command of the material...[authors] discuss a few refreshingly different topics -- such as vulnerability disclosure protocols -- that are hardly covered elsewhere. The authors did...deliver on their ethical obligations to provide accurate countermeasures to attack methods they describe -- a true value to readers. ... security professionals will find value in the authors' formidable understanding of the material. Information Security Magazine 20050101show more

About Shon Harris

Shon Harris (Fairchild Air Force Base, WA) MCSE, CISSP, is a security consultant who provides security assessments and analysis, vulnerability testing, and solutions to a wide range of different businesses. Allen Harper (Burke, VA) has served in the Marine Corps for 16 years as both enlisted and an officer. Currently, he serves as a security engineer in the US Department of Defense. Chris Eagle (Monterey, CA) is the Associate Chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, CA. Michael J. Lester (Miami, FL) CISSP, MCSE, MCSA, MCT, CCNP, CCDP, CCSE+, CCI, CCEA, CTT+, Linux+, Security+, Network+, I-net+, A+, holds a Bachelor of Science degree in Information Technology, and is a senior consultant and instructor for MicroLink more

Rating details

318 ratings
4.15 out of 5 stars
5 39% (125)
4 40% (128)
3 18% (56)
2 2% (7)
1 1% (2)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X