Industrial-Sized Deals TextBTS15 Shop Women's Handbags Learn more nav_sap_SWP_6M_fly_beacon Beach House $5 Off Fire TV Stick Off to College Essentials Shop Popular Services pivdl pivdl pivdl  Amazon Echo Starting at $99 Kindle Voyage Nintendo Digital Games Big Savings in the Amazon Fall Sportsman Event STEM Toys & Games
Gray Hat Hacking, Second Edition and over one million other books are available for Amazon Kindle. Learn more
Buy Used
Condition: Used: Good
Comment: Some wear to cover, corners and edges. No marks. Binding tight. Stain on bottom closed pages. Ships fast from Amazon!
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Gray Hat Hacking, Second Edition: The Ethical Hacker's Handbook Paperback – December 20, 2007

4 customer reviews
ISBN-13: 978-0071495684 ISBN-10: 0071495681 Edition: 2nd

Price: $9.68
9 New from $13.97 25 Used from $1.32
Amazon Price New from Used from
"Please retry"
"Please retry"
$13.97 $1.32

There is a newer edition of this item:

Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

InterDesign Brand Store Awareness Rent Textbooks

Editorial Reviews

From the Back Cover

Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line code samples, detailed countermeasures, and moral disclosure procedures. Find out how to execute effective penetration tests, use fuzzers and sniffers, perform reverse engineering, and find security holes in Windows and Linux applications. You'll also learn how to trap and autopsy stealth worms, viruses, rootkits, adware, and malware.

  • Implement vulnerability testing, discovery, and reporting procedures that comply with applicable laws
  • Learn the basics of programming, stack operations, buffer overflow and heap vulnerabilities, and exploit development
  • Test and exploit systems using Metasploit and other tools
  • Break in to Windows and Linux systems with perl scripts, Python scripts, and customized C programs
  • Analyze source code using ITS4, RATS, FlawFinder, PREfast, Splint, and decompilers
  • Understand the role of IDA Pro scripts, FLAIR tools, and third-party plug-ins in discovering software vulnerabilities
  • Reverse-engineer software using decompiling, profiling, memory monitoring, and data flow analysis tools
  • Reveal client-side web browser vulnerabilities with MangleMe, AxEnum, and AxMan
  • Probe Windows Access Controls to discover insecure access tokens, security descriptors, DACLs, and ACEs
  • Find and examine malware and rootkits using honeypots, honeynets, and Norman SandBox technology


About the Author

Shon Harris, MCSE, CISSP, is the president of Logical Security, an educator, and a security consultant.

Allen Harper, CISSP, is the president and owner of n2netsecurity, Inc., in North Carolina.

Chris Eagle is the associate chairman of the Computer Science Department at the Naval Postgraduate School (NPS) in Monterey, California.

Jonathan Ness, CHFI, is a lead software security engineer at Microsoft.


Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Product Details

  • Paperback: 550 pages
  • Publisher: McGraw-Hill Osborne Media; 2 edition (December 20, 2007)
  • Language: English
  • ISBN-10: 0071495681
  • ISBN-13: 978-0071495684
  • Product Dimensions: 7.4 x 1 x 9.2 inches
  • Shipping Weight: 2.1 pounds
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (4 customer reviews)
  • Amazon Best Sellers Rank: #1,481,629 in Books (See Top 100 in Books)

More About the Author

Shon Harris, CISSP is the founder and CEO of Logical Security, a computer security consultant, a former engineer in the Air Force's Information Warfare unit, an instructor and an author. She has authored three best selling CISSP books, was a contributing author to the book Hacker's Challenge, a contributing author to the book Gray Hat Hacking, a contributing author to the Security Information and Event Management (SIEM) Implementation book and a technical editor for Information Security Magazine. Ms. Harris has developed a full digital information security product series for Pearson publishing.

Ms. Harris has consulted for several Fortune 500 companies in the U.S., including American Express, Warner Brothers, Bridgestone\Firestone, CitiBank, CitiFinancial, AOL, Cisco and many more. Her competencies range from setting up risk management programs and developing enterprise network security architectures to constructing enterprise-wide security programs that connects computer security and business needs in a synergistic manner.

Ms. Harris has extensive knowledge and practical experience pertaining to legal and regulatory compliance. She has worked with the largest corporations within the U.S. to become compliant with OCC, SOX, GLBA, HIPAA, PCI and SAS70. Ms. Harris specializes in risk management, governance and the development of and implementation of security metrics.

Ms. Harris has taught information security to a wide range of clients, some of which have included Microsoft, Department of Defense, Department of Energy, National Security Agency, Bank of America, Defense Information Systems Agency, RSA, U.S. Military Academy at West Point, and many financial institutions.

Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.

Customer Reviews

Most Helpful Customer Reviews

23 of 23 people found the following review helpful By Henrik Lund Kramshøj on June 8, 2008
Format: Paperback
Second edition of books I like are always welcome - and this book is no exception. So I was very happy when I was provided a review copy from the publisher.

I really liked the first edition of this book and consider this follow up an essential book for IT-security consultants and other professionals.

The book is comprised of five parts which each give an overview of important subjects for professional IT-security consultants. Within these five parts are 21 chapters which are mostly around 20 pages, making it possible for busy professionals to digest a chapter while performing the usual projects and everyday work.

The five parts are:
I) introduction to ethical disclosure, including legal system in the US
II) penetration testing tools: metasploit and backtrack
III) exploits 101 with everything from basic programming skills to writing shellcode, but only on Linux and Microsoft Windows.
IV) Vulnerability analysis which is a strong part about static analysis, reverse engineering, fuzzing, writing real life exploits and references to the essential tools used for these purposes
V) Malware analysis is saved for last and includes the finishing touch to why IT-security professionals should care about all the rest of the book

The great thing about this book are that non-programmers are presented with enough materials to get started in finding and developing exploits. This was also the reason why it took so long to do this review. Each time I read a chapter I was itching to get started running the examples and trying the techniques.

Since this book tries to cover a lot of materials they have decided to include references.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 6 people found the following review helpful By Andrew on January 21, 2010
Format: Paperback Verified Purchase
In a few words, I loved this book. This book is written in a straightforward manner, right to the point, hands-on exercises and all. The weak points one might find is that it assumes a fair amount of knowledge in the areas of programming (C and python) as well as some networking. I don't think these are real flaws, since this book is directed as hacking (and cracking) in their purest form.
The flaw I would note is that despite having those unsaid requirements, the book tries to appeal to beginners by skipping ahead on the lines of: in the case you're not familiar with C, just copy this example and don't worry about it. For a programmer, this is a waste of time and something which raises suspicion about how serious the authors were. For a beginner, this doesn't help at all. I would rather have a line there saying: read a book on C and come back when you're ready.
But if you're willing to go ahead despite this, you're in for quite a treat.
2 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
Close comment
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
1 of 3 people found the following review helpful By IT VP on November 3, 2009
Format: Paperback Verified Purchase
This book is very informative and well worth the reading. Had each of my staff read it and they all got something different out of it.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Want to discover more products? Check out these pages to see more: hacking, networks, linux security, computer security