Vista normal Vista MARC Vista ISBD

Gray hat hacking : the ethical hacker´s handbook / Shon Harris, Hallen Harper, Chris Eagle, Jonathan Ness

Colaborador(es): Harris, Shon | Harper, Hallen | Eagle, Chris | Ness, Jonathan.
Tipo de material: materialTypeLabelLibroEditor: New York, NY : McGraw-Hill, 2008Edición: Segunda edición.Descripción: xxiv, 550 páginas : ilustraciones.ISBN: 978-0-07-149568-4.Tema(s): Seguridad en computadores -- Control de acceso -- Criptografía | Delitos por computador | Protección de datos | Privacidad de los datos | Internet (Red de computadores) | Virus informáticos | Cifras y claves | ComputadoresClasificación CDD: 005.8 G778h 2008
Contenidos:
INTRODUCTION TO ETHICAL DISCLOSURE -Ethics of ethical hacking -Ethical hacking and the legal system -Proper and ethical disclosure PENETRATION TESTING AND TOOLS -Using metasploit -Using the back track liveCD Linux distribution EXPLOITS 101 -Programming survival skills -Basic Linux sploit -Advanced Linux sploits -Shellcode strategies -Writing Linux shellcode -Basic Windows exploits VULNERABILITY ANALYSIS -Passive analysis -Advanced statics analysis with IDA Pro -Advanced reverse engineering -Client-side browser exploits -Exploiting Windows acces control model for local elevation of privilege -Intelligent fuzzing with Sulley -From vulnerability to exploit -Closing the holes : mitigation MALWARE ANALYSIS -Collecting malware and initial analysis -Hacking malware
Tipo de ítem Biblioteca de origen Colección Signatura Copia número Estado Fecha de vencimiento Código de barras Reserva de ejemplares
Libro (Reserva) Libro (Reserva) Campus I
Reserva 005.8 G778h 2008 (Navegar estantería) Ej. 1 Disponible 090485
Libro (Col. General) Libro (Col. General) Campus I
Colección General 005.8 G778h 2008 (Navegar estantería) Ej. 2 Disponible 090486
Reservas Totales: 0

CAMPUS I

INTRODUCTION TO ETHICAL DISCLOSURE
-Ethics of ethical hacking
-Ethical hacking and the legal system
-Proper and ethical disclosure
PENETRATION TESTING AND TOOLS
-Using metasploit
-Using the back track liveCD Linux distribution
EXPLOITS 101
-Programming survival skills
-Basic Linux sploit
-Advanced Linux sploits
-Shellcode strategies
-Writing Linux shellcode
-Basic Windows exploits
VULNERABILITY ANALYSIS
-Passive analysis
-Advanced statics analysis with IDA Pro
-Advanced reverse engineering
-Client-side browser exploits
-Exploiting Windows acces control model for local elevation of privilege
-Intelligent fuzzing with Sulley
-From vulnerability to exploit
-Closing the holes : mitigation
MALWARE ANALYSIS
-Collecting malware and initial analysis
-Hacking malware