gray hat hacking the ethical hackers handbook phần 1 docx

58 234 0
gray hat hacking the ethical hackers handbook phần 1 docx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... Sockets with Python 12 1 12 2 12 6 12 7 12 8 12 8 12 8 12 9 12 9 13 0 13 0 13 0 13 1 13 2 13 2 13 3 13 3 13 3 13 5 13 6 13 7 13 7 13 7 13 9 13 9 14 0 14 0 14 0 14 1 14 2 14 3 14 4 14 4 14 6 Gray Hat Hacking: The Ethical Hacker’s Handbook xii Chapter 7 Basic Linux Exploits 14 7 Stack Operations Function... Determine the Attack Vector Build the Exploit Sandwich Test the Exploit 14 8 14 8 14 9 15 0 15 3 15 4 15 5 15 7 15 8 16 0 16 2 16 3 16 3 16 6 16 7 16 8 Chapter 8 Advanced Linux Exploits 16 9 Format String Exploits The Problem ... 10 11 12 13 14 15 Chapter 2 Ethical Hacking and the Legal System 17 Addressing Individual Laws 18 USC Section 10 29: The Access Device Statute 18 USC Section 10 30 of The Computer Fraud and Abuse Act State Law Alternatives 18 USC Sections 2 510 , et... at book@grayhathackingbook.com Also, browse to www.grayhathackingbook.com for additional technical information and resources related to this book and ethical hacking Introduction to Ethical Disclosure ■ Chapter 1 ■ Chapter 2 ■ Chapter 3 Ethics of Ethical Hacking Ethical Hacking and the Legal System Proper and Ethical Disclosure 1 This page intentionally left blank CHAPTER Ethics of Ethical Hacking. .. intrusions The fact is, malware has evolved to Gray Hat Hacking: The Ethical Hacker’s Handbook 6 Table 1- 1 Downtime Losses (Source: Alinean) Business Application Estimated Outage Cost per Minute Supply chain management E-commerce Customer service ATM/POS/EFT Financial management Human capital management Messaging Infrastructure $11 ,000 $10 ,000 $3,700 $3,500 $1, 500 $1, 000 $1, 000 $700 become one of the most... Return to libc Exploits Bottom Line 16 9 17 0 17 3 17 5 17 7 18 0 18 1 18 2 18 2 18 3 18 3 18 5 19 2 Chapter 9 Shellcode Strategies 19 5 User Space Shellcode System Calls Basic Shellcode ... Attacking Weak DACLs in the Windows Registry Attacking Weak Directory DACLs Attacking Weak File DACLs 387 387 388 388 388 389 390 394 397 400 4 01 403 406 406 408 409 417 418 418 424 428 433 Gray Hat Hacking: The Ethical Hacker’s Handbook xvi What Other Object Types Are out There? Enumerating... chapters are presented and the other chapters have been updated In Part I of this book we lay down the groundwork of the necessary ethics and expectations of a gray hat hacker This section: • Clears up the confusion about white, black, and gray hat definitions and characteristics • Reviews the slippery ethical issues that should be understood before carrying out any type of ethical hacking activities • Surveys... Metasploit db_autopwn Tools 11 0 11 2 11 4 11 8 Part III Exploits 10 1 11 9 Chapter 6 Programming Survival Skills 12 1 C Programming Language Basic C Language Constructs Sample... guys.” The bad guys use the tactics, techniques, and fighting methods of a specific type of enemy—Libya, Russia, United States, Germany, North Korea, and so on 3 1 Gray Hat Hacking: The Ethical Hacker’s Handbook 4 The goal of these exercises is to allow the pilots to understand enemy attack patterns, and to identify and be prepared for certain offensive actions so they can properly react in the correct . co-taught Exploiting 10 1 at Black Hat in 2006. For fun, he has enjoyed participating in capture the flag at Defcon for the last two years. Gray Hat Hacking TheEthicalHacker’s Handbook Second Edition Shon.

Ngày đăng: 14/08/2014, 18:21

Từ khóa liên quan

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan