Personnaliser

OK

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition - Allen Harper

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre
Filtrer par :
Neuf (5)
Occasion
Reconditionné

55,43 €

Produit Neuf

  • Ou 13,86 € /mois

    • Livraison à 0,01 €
    • Livré entre le 4 et le 11 mai
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781264268948_dbm

    Nos autres offres

    • 59,39 €

      Produit Neuf

      Ou 14,85 € /mois

      • Livraison à 0,01 €
      Voir les modes de livraison
      4,7/5 sur + de 1 000 ventes

      Nouvel article expédié dans le 24H à partir des Etats Unis Livraison au bout de 20 à 30 jours ouvrables.

    • 63,18 €

      Produit Neuf

      Ou 15,80 € /mois

      • Livraison à 0,01 €
      • Livré entre le 15 et le 27 mai
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes

      Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.

    • 64,31 €

      Produit Neuf

      Ou 16,08 € /mois

      • Livraison : 3,99 €
      • Livré entre le 4 et le 9 mai
      Voir les modes de livraison
      4,8/5 sur + de 1 000 ventes
    • 70,60 €

      Produit Neuf

      Ou 17,65 € /mois

      • Livraison : 5,00 €
      • Livré entre le 4 et le 7 mai
      Voir les modes de livraison

      Exp¿di¿ en 7 jours ouvr¿s

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition de Allen Harper Format Broché  - Livre Sciences de la vie et de la terre

        Note : 0 0 avis sur Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition de Allen Harper Format Broché  - Livre Sciences de la vie et de la terre

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition de Allen Harper Format Broché

         - Livre Sciences de la vie et de la terre

        Livre Sciences de la vie et de la terre - Allen Harper - 01/03/2022 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Allen Harper - Daniel Fernandez - Huascar Tejeda - Michael Baucom - Moses Frost - Ryan Linn - Stephen Sims
      • Editeur : Mcgraw Hill Llc
      • Langue : Anglais
      • Parution : 01/03/2022
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 704
      • Expédition : 1184
      • Dimensions : 22.9 x 18.8 x 3.7
      • ISBN : 1264268947



      • Résumé :

        Preface
        Acknowledgments
        Introduction

        Part I. Preparation

        Chapter 1. Gray Hat Hacking
        Gray Hat Hacking Overview
        History of Hacking
        Ethics and Hacking
        Definition of Gray Hat Hacking
        History of Ethical Hacking
        History of Vulnerability Disclosure
        Bug Bounty Programs
        Know the Enemy: Black Hat Hacking
        Advanced Persistent Threats
        Lockheed Martin Cyber Kill Chain
        Courses of Action for the Cyber Kill Chain
        MITRE ATT&CK Framework
        Summary
        For Further Reading
        References

        Chapter 2. Programming Survival Skills
        C Programming Language
        Basic C Language Constructs
        Lab 2-1: Format Strings
        Lab 2-2: Loops
        Lab 2-3: if/else
        Sample Programs
        Lab 2-4: hello.c
        Lab 2-5: meet.c
        Compiling with gcc
        Lab 2-6: Compiling meet.c
        Computer Memory
        Random Access Memory
        Endian
        Segmentation of Memory
        Programs in Memory
        Buffers
        Strings in Memory
        Pointers
        Putting the Pieces of Memory Together
        Lab 2-7: memory.c
        Intel Processors
        Registers
        Assembly Language Basics
        Machine vs. Assembly vs. C
        AT&T vs. NASM
        Addressing Modes
        Assembly File Structure
        Lab 2-8: Simple Assembly Program
        Debugging with gdb
        gdb Basics
        Lab 2-9: Debugging
        Lab 2-10: Disassembly with gdb
        Python Survival Skills
        Getting Python
        Lab 2-11: Launching Python
        Lab 2-12: Hello, World! in Python
        Python Objects
        Lab 2-13: Strings
        Lab 2-14: Numbers
        Lab 2-15: Lists
        Lab 2-16: Dictionaries
        Lab 2-17: Files with Python
        Lab 2-18: Sockets with Python
        Summary
        For Further Reading
        References

        Chapter 3. Linux Exploit Development Tools
        Binary, Dynamic Information-Gathering Tools
        Lab 3-1: Hello.c
        Lab 3-2: ldd
        Lab 3-3: objdump
        Lab 3-4: strace
        Lab 3-5: ltrace
        Lab 3-6: checksec
        Lab 3-7: libc-database
        Lab 3-8: patchelf
        Lab 3-9: one_gadget
        Lab 3-10: Ropper
        Extending gdb with Python
        Pwntools CTF Framework and Exploit Development Library
        Summary of Features
        Lab 3-11: leak-bof.c
        HeapME (Heap Made Easy) Heap Analysis and Collaboration Tool
        Installing HeapME
        Lab 3-12: heapme_demo.c
        Summary
        For Further Reading
        References

        Chapter 4. Introduction to Ghidra
        Creating Our First Project
        Installation and QuickStart
        Setting the Project Workspace
        Functionality Overview
        Lab 4-1: Improving Readability with Annotations
        Lab 4-2: Binary Diffing and Patch Analysis
        Summary
        For Further Reading
        References

        Chapter 5. IDA Pro
        Introduction to IDA Pro for Reverse Engineering
        What Is Disassembly?
        Navigating IDA Pro
        IDA Pro Features and Functionality
        Cross-References (Xrefs)
        Function Calls
        Proximity Browser
        Opcodes and Addressing
        Shortcuts
        Comments
        Debugging with IDA Pro
        Summary
        For Further Reading
        References

        Part II. Ethical Hacking

        Chapt...

        Biographie:
        Lab 7-6: Compiling and Testing Nim Launchers
        Network Evasion
        Encryption
        Alternate Protocols
        C2 Templates
        EDR Evasion
        Killing EDR Products
        Bypassing Hooks
        Summary
        For Further Reading

        Chapter 8. Building a Threat Hunting Lab
        Threat Hunting and Labs
        Options of Threat Hunting Labs
        Method for the Rest of this Chapter
        Basic Threat Hunting Lab: DetectionLab
        Prerequisites
        Lab 8-1: Install the Lab on Your Host
        Lab 8-2: Install the Lab in the Cloud
        Lab 8-3: Looking Around the Lab
        Extending Your Lab
        HELK
        Lab 8-4: Install HELK
        Lab 8-5: Install Winlogbeat
        Lab 8-6: Kibana Basics
        Lab 8-7: Mordor
        Summary
        For Further Reading
        References

        Chapter 9. Introduction to Threat Hunting
        Threat Hunting Basics
        Types of Threat Hunting
        Workflow of a Threat Hunt
        Normalizing Data Sources with OSSEM
        Data Sources
        OSSEM to the Rescue
        Data-Driven Hunts Using OSSEM
        MITRE ATT&CK Framework Refresher: T1003.002
        Lab 9-1: Visualizing Data Sources with OSSEM
        Lab 9-2: AtomicRedTeam Attacker Emulation
        Exploring Hypothesis-Driven Hunts
        Lab 9-3: Hypothesis that Someone Copied a SAM File
        Crawl, Walk, Run
        Enter Mordor
        Lab 9-4: Hypothesis that Someone Other than an Admin Launched PowerShell
        Threat Hunter Playbook
        Departure from HELK for Now
        Spark and Jupyter
        Lab 9-5: Automated Playbooks and Sharing of Analytics
        Summary
        For Further Reading
        References

        Part III. Hacking Systems

        Chapter 10. Basic Linux Exploits
        Stack Operations and Function-Calling Procedures
        Buffer Overflows
        Lab 10-1: Overflowing meet.c
        Ramifications of Buffer Overflows
        Local Buffer Overflow Exploits
        Lab 10-2: Components of the Exploit
        Lab 10-3: Exploiting Stack Overflows from the Command Line
        Lab 10-4: Writing the Exploit with Pwntools
        Lab 10-5: Exploiting Small Buffers
        Exploit Development Process
        Lab 10-6: Building Custom Exploits
        Summary
        For Further Reading

        Chapter 11. Advanced Linux Exploits
        Lab 11-1: Vulnerable Program and Environment Setup
        Lab 11-2: Bypassing Non-Executable Stack (NX) with Return-Oriented Programming (ROP)
        Lab 11-3: Defeating Stack Canaries
        Lab 11-4: ASLR Bypass with an Information Leak
        Lab 11-5: PIE Bypass with an Information Leak
        Summary
        For Further Reading
        References

        Chapter 12. Linux Kernel Exploits
        Lab 12-1: Environment Setup and Vulnerable procfs Module
        Lab 12-2: ret2usr
        Lab 12-3: Defeating Stack Canaries
        Lab 12-4: Bypassing Supervisor Mode Execution Protection (SMEP) and Kernel Page-Table Isolation (KPTI)
        Lab 12-5: Bypassing Supervisor Mode Access Prevention (SMAP)
        Lab 12-6: Defeating Kernel Address Space Layout Randomization (KASLR)
        Summary
        For Further Reading
        References

        Chapter 13. Basic Windows Exploitation
        Compiling and Debugging Windows Programs
        Lab 13-1: Compiling on Windows
        Debugging on Windows with Immunity...

        Sommaire:
        Lab 7-6: Compiling and Testing Nim Launchers
        Network Evasion
        Encryption
        Alternate Protocols
        C2 Templates
        EDR Evasion
        Killing EDR Products
        Bypassing Hooks
        Summary
        For Further Reading

        Chapter 8. Building a Threat Hunting Lab
        Threat Hunting and Labs
        Options of Threat Hunting Labs
        Method for the Rest of this Chapter
        Basic Threat Hunting Lab: DetectionLab
        Prerequisites
        Lab 8-1: Install the Lab on Your Host
        Lab 8-2: Install the Lab in the Cloud
        Lab 8-3: Looking Around the Lab
        Extending Your Lab
        HELK
        Lab 8-4: Install HELK
        Lab 8-5: Install Winlogbeat
        Lab 8-6: Kibana Basics
        Lab 8-7: Mordor
        Summary
        For Further Reading
        References

        Chapter 9. Introduction to Threat Hunting
        Threat Hunting Basics
        Types of Threat Hunting
        Workflow of a Threat Hunt
        Normalizing Data Sources with OSSEM
        Data Sources
        OSSEM to the Rescue
        Data-Driven Hunts Using OSSEM
        MITRE ATT&CK Framework Refresher: T1003.002
        Lab 9-1: Visualizing Data Sources with OSSEM
        Lab 9-2: AtomicRedTeam Attacker Emulation
        Exploring Hypothesis-Driven Hunts
        Lab 9-3: Hypothesis that Someone Copied a SAM File
        Crawl, Walk, Run
        Enter Mordor
        Lab 9-4: Hypothesis that Someone Other than an Admin Launched PowerShell
        Threat Hunter Playbook
        Departure from HELK for Now
        Spark and Jupyter
        Lab 9-5: Automated Playbooks and Sharing of Analytics
        Summary
        For Further Reading
        References

        Part III. Hacking Systems

        Chapter 10. Basic Linux Exploits
        Stack Operations and Function-Calling Procedures
        Buffer Overflows
        Lab 10-1: Overflowing meet.c
        Ramifications of Buffer Overflows
        Local Buffer Overflow Exploits
        Lab 10-2: Components of the Exploit
        Lab 10-3: Exploiting Stack Overflows from the Command Line
        Lab 10-4: Writing the Exploit with Pwntools
        Lab 10-5: Exploiting Small Buffers
        Exploit Development Process
        Lab 10-6: Building Custom Exploits
        Summary
        For Further Reading

        Chapter 11. Advanced Linux Exploits
        Lab 11-1: Vulnerable Program and Environment Setup
        Lab 11-2: Bypassing Non-Executable Stack (NX) with Return-Oriented Programming (ROP)
        Lab 11-3: Defeating Stack Canaries
        Lab 11-4: ASLR Bypass with an Information Leak
        Lab 11-5: PIE Bypass with an Information Leak
        Summary
        For Further Reading
        References

        Chapter 12. Linux Kernel Exploits
        Lab 12-1: Environment Setup and Vulnerable procfs Module
        Lab 12-2: ret2usr
        Lab 12-3: Defeating Stack Canaries
        Lab 12-4: Bypassing Supervisor Mode Execution Protection (SMEP) and Kernel Page-Table Isolation (KPTI)
        Lab 12-5: Bypassing Supervisor Mode Access Prevention (SMAP)
        Lab 12-6: Defeating Kernel Address Space Layout Randomization (KASLR)
        Summary
        For Further Reading
        References

        Chapter 13. Basic Windows Exploitation
        Compiling and Debugging Windows Programs
        Lab 13-1: Compiling on Windows
        Debugging on Windows with Immunity...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com