Gray Hat Hacking 2nd edition 07-07-2011, 01:57 PM
#1
Hey guys,
This Is a very detailed Ebook, that's definitely worth delving Into. Here's what's Inclusive:
Part I Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure
Part II Penetration Testing and Tools
Chapter 4 Using Metasploit
Chapter 5 Using the BackTrack LiveCD Linux
Part III Exploits 101
Chapter 6 Programming Survival Skills
Chapter 7 Basic Linux Exploits .
Chapter 8 Advanced Linux Exploits
Chapter 9 Shellcode Strategies
Chapter 10 Writing Linux Shellcode .
Chapter 11 Basic Windows Exploits
Part IV Vulnerability Analysis
Chapter 12 Passive Analysis
Chapter 13 Advanced Static Analysis with IDA Pro
Chapter 14 Advanced Reverse Engineering
Chapter 15 Client-Side Browser Exploits
Chapter 16 Exploiting Windows Access Control Model for
Local Elevation of Privilege
Chapter 17 Intelligent Fuzzing with Sulley
Chapter 18 From Vulnerability to Exploit
I'm reading It periodically as time permits, and find It to be quite beneficial.
Download: http://www.mediafire.com/?078blfi77ap32s0
This Is a very detailed Ebook, that's definitely worth delving Into. Here's what's Inclusive:
Part I Introduction to Ethical Disclosure
Chapter 1 Ethics of Ethical Hacking
Chapter 2 Ethical Hacking and the Legal System
Chapter 3 Proper and Ethical Disclosure
Part II Penetration Testing and Tools
Chapter 4 Using Metasploit
Chapter 5 Using the BackTrack LiveCD Linux
Part III Exploits 101
Chapter 6 Programming Survival Skills
Chapter 7 Basic Linux Exploits .
Chapter 8 Advanced Linux Exploits
Chapter 9 Shellcode Strategies
Chapter 10 Writing Linux Shellcode .
Chapter 11 Basic Windows Exploits
Part IV Vulnerability Analysis
Chapter 12 Passive Analysis
Chapter 13 Advanced Static Analysis with IDA Pro
Chapter 14 Advanced Reverse Engineering
Chapter 15 Client-Side Browser Exploits
Chapter 16 Exploiting Windows Access Control Model for
Local Elevation of Privilege
Chapter 17 Intelligent Fuzzing with Sulley
Chapter 18 From Vulnerability to Exploit
I'm reading It periodically as time permits, and find It to be quite beneficial.
Download: http://www.mediafire.com/?078blfi77ap32s0