Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition (English, Paperback, Harper Allen)

Share

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition  (English, Paperback, Harper Allen)

4.3
279 Ratings & 30 Reviews
₹799
1,025
22% off
Hurry, Only a few left!
  • Combo OfferBuy 2 items save 5%; Buy 3 save 10%; Buy 4+ save 15%See all products
    T&C
  • Bank OfferExtra 5% off* with Axis Bank Buzz Credit Card
    T&C
  • Delivery
    Check
    Enter pincode
      Usually delivered in3-4 days
      ?
      Enter pincode for exact delivery dates/charges
    View Details
    Author
    Read More
    Highlights
    • Language: English
    • Binding: Paperback
    • Publisher: Mcgraw Hill
    • Genre: Computers
    • ISBN: 9780071077316, 0071077316
    Services
    • 10 Days Replacement Policy
      ?
    • Cash on Delivery available
      ?
    Seller
    TrueComRetail
    4.4
    • 10 Days Replacement Policy
      ?
  • View more sellers starting from 799
  • Description

    THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS

    Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource.

    • Develop and launch exploits using BackTrack and Metasploit
    • Employ physical, social engineering, and insider attack techniques
    • Build Perl, Python, and Ruby scripts that initiate stack buffer overflows
    • Understand and prevent malicious content in Adobe, Office, and multimedia files
    • Detect and block client-side, Web server, VoIP, and SCADA attacks
    • Reverse engineer, fuzz, and decompile Windows and Linux software
    • Develop SQL injection, cross-site scripting, and forgery exploits
    • Trap malware and rootkits using honeypots and SandBoxes
    Read More
    Specifications
    Book Details
    Imprint
    • India Professional
    Table of Contents
    • Part I: Introduction to Ethical Disclosure

      Chapter 1 Ethics of Ethical Hacking
      Chapter 2 Ethical Hacking and the Legal System
      Chapter 3 Proper and Ethical Disclosure

      Part II: Penetration Testing and Tools

      Chapter 4 Social Engineering Attacks
      Chapter 5 Physical Penetration Attacks
      Chapter 6 Insider Attacks
      Chapter 7 Using the BackTrack Linux Distribution
      Chapter 8 Using Metasploit
      Chapter 9 Managing a Penetration Test

      Part III: Exploiting

      Chapter 10 Programming Survival Skills
      Chapter 11 Basic Linux Exploits
      Chapter 12 Advanced Linux Exploits
      Chapter 13 Shellcode Strategies
      Chapter 14 Writing Linux Shellcode
      Chapter 15 Windows Exploits
      Chapter 16 Understanding and Detecting Content-Type Attacks
      Chapter 17 Web Application Security Vulnerabilities
      Chapter 18 VoIP Attacks
      Chapter 19 SCADA Attacks

      Part IV: Vulnerability Analysis

      Chapter 20 Passive Analysis
      Chapter 21 Advanced Static Analysis with IDA Pro
      Chapter 22 Advanced Reverse Engineering
      Chapter 23 Client-Side Browser Exploits
      Chapter 24 Exploiting the Windows Access Control Model
      Chapter 25 Intelligent Fuzzing with Sulley
      Chapter 26 From Vulnerability to Exploit
      Chapter 27 Closing the Holes: Mitigation

      Part V: Malware Analysis

      Chapter 28 Collecting Malware and Initial Analysis
      Chapter 29 Hacking Malware
      Index

    Dimensions
    Width
    • 78 mm
    Height
    • 614 mm
    Length
    • 469 mm
    Weight
    • 512 gr
    Frequently Bought Together
    1 Item
    799
    2 Add-ons
    1,280
    Total
    2,079
    Ratings & Reviews
    4.3
    279 Ratings &
    30 Reviews
    • 5
       166
    • 4
       70
    • 3
       21
    • 2
       11
    • 1
       11
    4

    ABOUT GRAY hAT HACKING

    this book is awesome u should go through this book it really help
    in linux exploits, metasploit exploits, windows exploits,and many many more things




    if u know a bit bout hacking then only preffer this book
    READ MORE

    kedar

    Certified Buyer

    17 Apr, 2012

    26
    5
    Report Abuse
    5

    comprehensive coverage about different topics of Computer Security

    This book starts with ethical and legal aspects of penetration testing, then covers different technical aspects of penetration testing, shared about windows and linux exploits, vulnerability scanning related concepts, then about incident mitigation strategies and last but not least nice information about catching malware using honeypots/honeynets and then briefed about ways of dealing malware to understand it better.

    A helpful book that is well worth to be in every computer security guy's in...
    READ MORE

    Raghu Veer D

    Certified Buyer

    13 Aug, 2012

    19
    7
    Report Abuse
    5

    A good book for beginners

    This book provides all details of required tools for hacking in simple and easy language. At the same time it also gives details about the law and penalties a person can face with illegal activities of hacking. A person wanto to have basic knowledge of hacking along with ethical issues can go for it. Thanks to Flipkart for fast, safe and secure delivery.
    READ MORE

    Rajesh C. Yadav

    Certified Buyer, Surat

    16 Aug, 2016

    13
    18
    Report Abuse
    5

    Awesome book

    If you wanna learn real hacking then this book is for. Unlike other books which makes you script kiddies this book will turn you into a real hacker who can exploit vulnerabilities in a system. It starts off with hacking laws, continues with shell coding for Linux and Windows, web application hacking and finally mitigating attacks.
    READ MORE

    Karthik Panjaje

    9 May, 2012

    2
    1
    Report Abuse
    5

    Great reference

    This is a good book to get you started in this great field of INFOSEC.All the content is well explained with examples and extra references are given to expand your knowledge base.Book explains the techniques and framework that are used in pentesting and writing exploits.
    READ MORE

    Sanjeev Jha

    Certified Buyer

    14 Jul, 2012

    1
    1
    Report Abuse
    4

    Intermediate - Advance level guide....

    Gray hat hacking book is regarding most of the attacks performed and software hints on those attacks. Really good one if u have a knowledge already regarding some basic programming languages. Also enables u to get a head start against most of the outside attacks while u are in internet and other local networks. Compare to other books regarding hacking provides outdated issues and most of it wont work. But this has upto 75% of them working..
    READ MORE

    balaji

    Certified Buyer

    29 Aug, 2012

    1
    2
    Report Abuse
    5

    Excellent

    Best Book For In-Depth Knowledge.
    READ MORE

    Rajpal Singh

    Certified Buyer, Darbhanga

    23 Oct, 2018

    0
    0
    Report Abuse
    5

    Worth every penny

    this book is written in very high language you have to read some basics then you can understand this book
    READ MORE

    Geet Gourav Ghadai

    Certified Buyer, Anugul

    28 Jul, 2018

    0
    0
    Report Abuse
    5

    Mind-blowing purchase

    This is a advanced book. Everything is well explained with examples... Really liked the book..
    READ MORE

    Flipkart Customer

    Certified Buyer, Siliguri

    5 Jul, 2018

    0
    0
    Report Abuse
    5

    Worth every penny

    very fantastic book. contains proper explanations and examples for justification and better understanding. it's really helpful for a good and thorough understand
    READ MORE

    Anjali Sethi

    Certified Buyer, Ghaziabad

    25 Jun, 2018

    0
    0
    Report Abuse
    +
    All 30 reviews
    Questions and Answers
    Q:Which os Is needed?
    A:Kali Linux/Parrot Sec
    ?????????? ??????????
    Certified Buyer
    4
    0
    Report Abuse
    Q:i want to learn hacking and i have no knowledge about hacking so this book will help me or not if not then suggest me one please
    A:You get the basic knowledge about hacking by watching YouTube tutorials then you use this book for improve your experience.... In Ethetical
    Anonymous
    Certified Buyer
    1
    0
    Report Abuse
    Q:What type of hacking?
    A:well its more about the detail of hacking rather than an actual hacking or black hat hacking ,it covers most of the common areas of Hacking
    Prashant
    Certified Buyer
    4
    5
    Report Abuse
    Q:how to hack
    A:You have to install Kali Linux on your PC if you are in begging stage don't follow this book :-)
    Anonymous
    Certified Buyer
    0
    0
    Report Abuse
    Q:does it cover about wireless hacking , social media hacking, etc?? need an answer asap
    A:no
    ?????????? ??????????
    Certified Buyer
    0
    0
    Report Abuse
    Didn't get the right answer you were looking for
    Safe and Secure Payments.Easy returns.100% Authentic products.
    Back to top