Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Daniel Regalado, Shon Harris, Ryan Linn

Language: English

Pages: 656

ISBN: 0071832386

Format: PDF / Kindle (mobi) / ePub


Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.

  • Build and launch spoofing exploits with Ettercap and Evilgrade
  • Induce error conditions and crash software using fuzzers
  • Hack Cisco routers, switches, and network hardware
  • Use advanced reverse engineering to exploit Windows and Linux software
  • Bypass Windows Access Control and memory protection schemes
  • Scan for flaws in Web applications using Fiddler and the x5 plugin
  • Learn the use-after-free technique used in recent zero days
  • Bypass Web authentication via MySQL type conversion and MD5 injection attacks
  • Inject your shellcode into a browser's memory using the latest Heap Spray techniques
  • Hijack Web browsers with Metasploit and the BeEF Injection Framework
  • Neutralize ransomware before it takes control of your desktop
  • Dissect Android malware with JEB and DAD decompilers
  • Find one-day vulnerabilities with binary diffing

Terror, Security, and Money: Balancing the Risks, Benefits, and Costs of Homeland Security

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival

Securing the Smart Grid: Next Generation Power Grid Security

Social Engineering: The Art of Human Hacking

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Self-corrupting, 155–156 storing in environment variable, 253–254, 270 system call proxy, 152–153 user space, 145–153 vulnerabilities in kernel space, 157–158 shells, direct parameter access for, 269 SIDs (security identifiers) Authenticated Users group, 355 checking restricted, 349 contained in access token, 340 Everyone group, 355 LOGON, 356 looking for access granted to nonadmin, 365 role in Windows Access Control, 338, 339 special, 355 types of authentication, 355–356.

Form of help files that describe the basic syntax of the language and the built-in API functions available to the IDC programmer. IDAPython is an IDA Pro plug-in that allows running Python code in IDA. The project was started by Gergely Erdelyi, and due to its popularity it was merged into the standard IDA Pro release and is currently maintained by IDA developers. Python has proven itself as one of the prevalent languages in the reverse-engineering community, so it doesn’t come as a surprise.

Send out an ARP request for an IP address. This will be sent out to the broadcast address of the local broadcast domain, FF:FF:FF:FF:FF:FF. When the local hosts see this request, they match the requested IP address up to theirs, and if it matches, they respond with their MAC address. This is the typical way that networks work. When a host needs to talk to a system on another network, the host matches up the target IP retrieved from DNS with the local network addresses and determines whether the.

Protocol needs a way to tell hosts that the MAC address for an IP has changed and then have the hosts on the network update immediately. This message is called a “gratuitous ARP response.” It’s gratuitous because it wasn’t in response to a query. The purpose of the packet was to update ARP caches on local systems. When routers do this, it’s a great feature. When an attacker does this, it allows the attacker to inject himself/herself into the network traffic flow. By sending a gratuitous ARP.

Backdoor. In the msfcli window, you should now see that the Windows system has connected back with a shell and that there is now a prompt. Typing sysinfo will verify that it’s our system, and we now have an active backdoor on the target Windows 7 box. NetBIOS Name Spoofing and LLMNR Spoofing NetBIOS and Link-Local Multicast Name Resolution (LLMNR) are Microsoft name resolution protocols designed for workgroups and domains. When DNS fails, Windows systems search for the name using NetBIOS.

Download sample

Download