Ez7z mac uninstall1/8/2023 379 Chapter 18: Structured Exception Handler Overwrites. 361 Chapter 17: A Stack-Based Buffer Overflow in Windows. Part IV: Exploit Development Chapter 16: A Stack-Based Buffer Overflow in Linux. 243 Chapter 12: Bypassing Antivirus Applications. Part III: Attacks Chapter 8: Exploitation. Part II: Assessments Chapter 5: Information Gathering. 75 Chapter 4: Using the Metasploit Framework. Part I: The Basics Chapter 1: Setting Up Your Virtual Lab. xxv Chapter 0: Penetration Testing Primer. She was awarded a DARPA Cyber Fast Track grant to continue her work in mobile device security.įoreword by Peter Van Eeckhoutte. Her work in mobile security has been featured in print and on television internation ally. She pre sents at conferences around the world includ ing Black Hat, ShmooCon, and Derb圜on, and teaches classes on topics such as penetration testing, mobile hacking, and exploit develop ment. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.Ībout the Author Georgia Weidman is a penetration tester and researcher, as well as the founder of Bulb Security, a security consulting firm. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. The information in this book is distributed on an “As Is” basis, without warranty. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Other product and company names mentioned herein may be the trademarks of their respective owners. No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Penetration testing (Computer security) 2. Penetration testing : a hands-on introduction to hacking / Georgia Weidman. 245 8th Street, San Francisco, CA 94103 phone: 415.863.9900 fax: 415.863.9950 Library of Congress Cataloging-in-Publication Data Weidman, Georgia. ISBN-10: 1-59327-564-1 ISBN-13: 978-1-59327-564-8 Publisher: William Pollock Production Editor: Alison Law Cover Illustration: Mertsaloff/Shutterstock Interior Design: Octopod Studios Developmental Editor: William Pollock Technical Reviewer: Jason Oliver Copyeditor: Pamela Hunt Compositor: Susan Glinert Stevens Proofreader: James Fraleigh Indexer: Nancy Guenther For information on distribution, translations, or bulk sales, please contact No Starch Press, Inc. Printed in USA First printing 18 17 16 15 14 No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Penetration testing A Hands-On Introduction to Hacking
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |