Title | : | Gray Hat Hacking: The Ethical Hacker's Handbook |
Author | : | |
Rating | : | |
ISBN | : | 0072257091 |
ISBN-10 | : | 9780072257090 |
Language | : | English |
Format Type | : | Paperback |
Number of Pages | : | 434 |
Publication | : | First published January 1, 2004 |
Gray Hat Hacking: The Ethical Hacker's Handbook Reviews
-
very long and detailed about all sort of ethical hacking prescripts
Each chapter gives a spark to read more about the topic.
highly recommended ! -
The beginning of the book was very slow due to the topic being being on legalities etc. The book then started to pickup steam whilst going through the various topics of shell code. After the shell code sections I thought that the topics started to get very fragmentary, there was also a slight duplication of information towards the end of the book.
All in all it was a good book that was quite wide in coverage but not really that deep for most of the subject areas, I would of preferred the book to be half the thickness with more in depth coverage of less areas as further research is necessary to get a full understanding. -
A great intro to the CISSP books this book is easy to read and can serve as a reference further down the road.
-
A good overview of the different tools and techniques available. Covers both infra and web app. Not as in-depth as WAHH or NSA. Still worth reading as a new starter to the industry. (got me through an interview with a big company)
-
When the first installation of the Hacking Exposed series came out almost two decades ago, it caused quite a stir. Many worried that it would fall into the wrong hands, and attackers would use the tools and techniques described in the book to hack into corporate systems. While that may have been a valid concern, the reality is that when the book was in the right hands, it was a valuable resource for security professionals to use to secure their own networks.
In Gray Hat Hacking: The Ethical Hacker's Handbook, now in its fifth edition, nine contributors have written a highly technical, hands-on reference on ethical hacking. The book is updated and has 13 new chapters. While describing hacking methods, the book helps the reader understand the tools and techniques needed to secure their Windows and Linux-based systems.
This is a deep and detailed book meant for readers who want to get their hands dirty with tools and script writing, and have a desire to understand the inner workings of systems and how they can be secured.
Rather than just focusing on the software tools, the authors emphasize the importance of understanding how systems operate and what their vulnerabilities are. Through that, they show how these systems can then be exploited. But more importantly, they detail what needs to be done to secure these systems. -
Finally done! This book seems very good for people looking for an intro to active vulnerability research. The way it was used in my class was as a 30k foot view of "what hackers do", which made it less enjoyable. I'll happily revisit this book when/if I'm in the industry.
-
Instructive. Good introduction for me to the hacking techniques.
-
dghgdfgdfgd
-
good