THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details...
show more
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKSThwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.Develop and launch exploits using BackTrack and MetasploitEmploy physical, social engineering, and insider attack techniquesBuild Perl, Python, and Ruby scripts that initiate stack buffer overflowsUnderstand and prevent malicious content in Adobe, Office, and multimedia filesDetect and block client-side, Web server, VoIP, and SCADA attacksReverse engineer, fuzz, and decompile Windows and Linux softwareDevelop SQL injection, cross-site scripting, and forgery exploitsTrap malware and rootkits using honeypots and SandBoxes
show less