Gray Hat Hacking The Ethical Hacker's Handbook, 4/e (Paperback)
暫譯: 灰帽駭客:道德駭客手冊(第4版,平裝本)

Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims

買這商品的人也買了...

商品描述

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.

  • Build and launch spoofing exploits with Ettercap and Evilgrade
  • Induce error conditions and crash software using fuzzers
  • Hack Cisco routers, switches, and network hardware
  • Use advanced reverse engineering to exploit Windows and Linux software
  • Bypass Windows Access Control and memory protection schemes
  • Scan for flaws in Web applications using Fiddler and the x5 plugin
  • Learn the use-after-free technique used in recent zero days
  • Bypass Web authentication via MySQL type conversion and MD5 injection attacks
  • Inject your shellcode into a browser's memory using the latest Heap Spray techniques
  • Hijack Web browsers with Metasploit and the BeEF Injection Framework
  • Neutralize ransomware before it takes control of your desktop
  • Dissect Android malware with JEB and DAD decompilers
  • Find one-day vulnerabilities with binary diffing

 

商品描述(中文翻譯)

尋找和修復關鍵安全漏洞的尖端技術

透過安全專家的團隊提供的經驗策略,強化您的網路並避免數位災難。《Gray Hat Hacking: The Ethical Hacker's Handbook》第四版已全面更新,新增12個章節,解釋敵方目前的武器、技能和戰術,並提供經過實地測試的解決方案、案例研究和隨時可部署的測試實驗室。了解駭客如何獲取訪問權限、接管網路設備、編寫和注入惡意代碼,以及掠奪Web應用程式和瀏覽器。這本最先進的資源全面涵蓋基於Android的漏洞、逆向工程技術和網路法律。


  • 使用Ettercap和Evilgrade構建和啟動欺騙性漏洞

  • 使用模糊測試工具誘發錯誤條件並使軟體崩潰

  • 駭入Cisco路由器、交換機和網路硬體

  • 利用進階逆向工程技術攻擊Windows和Linux軟體

  • 繞過Windows訪問控制和記憶體保護機制

  • 使用Fiddler和x5插件掃描Web應用程式中的漏洞

  • 學習最近零日漏洞中使用的使用後釋放技術

  • 透過MySQL類型轉換和MD5注入攻擊繞過Web身份驗證

  • 使用最新的Heap Spray技術將您的shellcode注入瀏覽器的記憶體

  • 使用Metasploit和BeEF注入框架劫持Web瀏覽器

  • 在勒索病毒控制您的桌面之前中和它

  • 使用JEB和DAD反編譯器剖析Android惡意軟體

  • 透過二進位差異分析找到一天漏洞