.

[Article]-Programming Survival Skills

<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Fri Sep 08, 2006 1:54 pm

[Article]-Programming Survival Skills

There has been a lot of rumbling in the community as to whether knowledge of coding is required to be an ethical hacker. As you can see from some of the latest content on the site, EH-Net has been hard at work to get you the information you'll need to be a more prepared professional.

So, in this exclusive excerpt from Gray Hat Hacking, EH-Net specifically asked McGraw-Hill for the foundational chapter on the subject. Now you have no excuse not to know at least the very basics of programming. Hopefully after dipping your toes in the water, you'll want to jump right into the coding pool! :D

Programming Survival Skills

As always, add your thoughts and comments below,
Don
Last edited by don on Fri Sep 08, 2006 1:55 pm, edited 1 time in total.
CISSP, MCSE, CSTA, Security+ SME
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Fri Sep 08, 2006 9:59 pm

Re: [Article]-Programming Survival Skills

Submitted to all those darned Web 2.0 sites, so...

digg away.

Don
CISSP, MCSE, CSTA, Security+ SME
<<

pahoran

Newbie
Newbie

Posts: 1

Joined: Sat Sep 09, 2006 3:34 pm

Post Sat Sep 09, 2006 3:40 pm

Re: [Article]-Programming Survival Skills

FYI - From the artcile:

"Unlike the for loop, the while loop will always execute at least once. This is because the condition test is checked after the first iteration. It is important to realize that loops may be nested within each other."

This is not correct. In C, The while loop's condition is checked BEFORE each iteration.  It is the do-while loop that has its condition checked afterwards.
<<

Negrita

User avatar

Sr. Member
Sr. Member

Posts: 299

Joined: Sat Sep 10, 2005 5:45 pm

Location: /dev/null

Post Sat Sep 09, 2006 5:03 pm

Re: [Article]-Programming Survival Skills

I dugg that!!  :D

I've been looking for something like that for a long time now.

Pahoran, welcome and thanks for the correction.
CEH, CCSA NG/AI, NNCSS, MCP, MCSA 2003

There are 10 kinds of people, those that understand binary, and those that don't.
<<

LSOChris

Post Fri Nov 10, 2006 12:30 am

Re: [Article]-Programming Survival Skills

if you cant program, you will hit a point in PenTesting/Ethical Hacking where you get stuck.  its an absoultely necessary skill to be able to do at least a minimal amount of programming
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Wed Jan 16, 2008 10:49 pm

Re: [Article]-Programming Survival Skills

The sample chapter provided in this article comes from Shon Harris' book Gray Hat Hacking. If you didn't know, Gray Hat Hacking, The Ethical Hacker's Handbook 2nd Edition has been released. Here's some copy from the back cover:


Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out each exploit alongside line-by-line code samples, detailed countermeasures, and moral disclosure procedures. Find out how to execute effective penetration tests, use fuzzers and sniffers, perform reverse engineering, and find security holes in Windows and Linux applications. You'll also learn how to trap and autopsy stealth worms, viruses, rootkits, adware, and malware.

- Implement vulnerability testing, discovery, and reporting procedures that comply with applicable laws
- Learn the basics of programming, stack operations, buffer overflow and heap vulnerabilities, and exploit development
- Test and exploit systems using Metasploit and other tools
- Break in to Windows and Linux systems with perl scripts, Python scripts, and customized C programs
- Analyze source code using ITS4, RATS, FlawFinder, PREfast, Splint, and decompilers
- Understand the role of IDA Pro scripts, FLAIR tools, and third-party plug-ins in discovering software vulnerabilities
- Reverse-engineer software using decompiling, profiling, memory monitoring, and data flow analysis tools
- Reveal client-side web browser vulnerabilities with MangleMe, AxEnum, and AxMan
- Probe Windows Access Controls to discover insecure access tokens, security descriptors, DACLs, and ACEs
- Find and examine malware and rootkits using honeypots, honeynets, and Norman SandBox technology


Enjoy,
Don
CISSP, MCSE, CSTA, Security+ SME
<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Thu Jun 05, 2008 11:38 pm

Re: [Article]-Programming Survival Skills

The title of this thread is from the sample chapter from the first edition of this book which is shared in its entirety for you. The second edition has updated this chapter with a really great intro to Python. Go check it out:

Gray Hat Hacking, The Ethical Hacker's Handbook 2nd Edition

Don
CISSP, MCSE, CSTA, Security+ SME

Return to Book Reviews

Who is online

Users browsing this forum: No registered users and 0 guests

cron
.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software