Atnaujinkite slapukų nuostatas

El. knyga: Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

4.09/5 (577 ratings by Goodreads)
  • Formatas: 720 pages
  • Išleidimo metai: 05-Feb-2011
  • Leidėjas: McGraw-Hill Professional
  • Kalba: eng
  • ISBN-13: 9780071742566
Kitos knygos pagal šią temą:
  • Formatas: 720 pages
  • Išleidimo metai: 05-Feb-2011
  • Leidėjas: McGraw-Hill Professional
  • Kalba: eng
  • ISBN-13: 9780071742566
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures.

Fully updated expanded to cover the latest devious hacking methods

Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current issues, threats, tools and techniques.

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.

Gray Hat Hacking, Third Edition features eight new chapters, covering:

  • Social engineering
  • Physical attacks
  • Insider attacks
  • VoIP attacks
  • SCADA attacks
  • Dradis framework and information sharing
  • Client content-based attacks
  • Web server attacks

Detailed, authoritative coverageIntroduction to Ethical Disclosure; Ethics of Ethical Hacking; Ethical Hacking and the Legal System; Proper and Ethical Disclosure; Penetration Testing and Tools; Social Engineering Attacks; Physical Attacks; Insider Attacks; Using BackTrack LiveCD Linux Distribution; Using Metasploit; Dradis and Managing a Pen Test; Exploiting; Progamming SProgrammingills; Basic Linux Exploits; Advanced Linux Exploits; Shellcode Strategies; Writing Linux Shell Code; Basic Windows Exploits; Client Content Based Attacks; Web Server Attacks; VoIP Attacks; SCADA Attacks; Vulnerability Analysis; Passive Analysis; Advanced Static Analysis with IDA Pro; Advanced Reverse Engineering; Client-Side Browser Exploits; Exploiting Windows Access Control Model; Intelligent Fuzzing with Sulley; From Vulnerability to Exploit; Closing the Holes: Mitigation Techniques; Malware Analysis; Collecting Malware and Initial Analysis; Hacking Malware

Preface xxiii
Acknowledgments xxv
Introduction xxvii
Part I Introduction to Ethical Disclosure
1(74)
Chapter 1 Ethics of Ethical Hacking
3(20)
Why You Need to Understand Your Enemy's Tactics
3(5)
Recognizing the Gray Areas in Security
8(2)
How Does This Stuff Relate to an Ethical Hacking Book?
10(5)
Vulnerability Assessment
10(1)
Penetration Testing
11(4)
The Controversy of Hacking Books and Classes
15(4)
The Dual Nature of Tools
16(2)
Recognizing Trouble When It Happens
18(1)
Emulating the Attack
19(1)
Where Do Attackers Have Most of Their Fun?
19(4)
Security Does Not Like Complexity
20(3)
Chapter 2 Ethical Hacking and the Legal System
23(24)
The Rise of Cyberlaw
23(2)
Understanding Individual Cyberlaws
25(22)
18 USC Section 1029: The Access Device Statute
25(4)
18 USC Section 1030 of the Computer Fraud and Abuse Act
29(9)
18 USC Sections 2510, et. Seq., and 2701, et. Seq., of the Electronic Communication Privacy Act
38(4)
Digital Millennium Copyright Act (DMCA)
42(3)
Cyber Security Enhancement Act of 2002
45(1)
Securely Protect Yourself Against Cyber Trespass Act (SPY Act)
46(1)
Chapter 3 Proper and Ethical Disclosure
47(28)
Different Teams and Points of View
48(2)
How Did We Get Here?
49(1)
CERT's Current Process
50(2)
Full Disclosure Policy---the RainForest Puppy Policy
52(2)
Organization for Internet Safety (OIS)
54(8)
Discovery
54(1)
Notification
55(2)
Validation
57(2)
Resolution
59(2)
Release
61(1)
Conflicts Will Still Exist
62(5)
"No More Free Bugs"
63(4)
Case Studies
67(5)
Pros and Cons of Proper Disclosure Processes
67(4)
Vendors Paying More Attention
71(1)
So What Should We Do from Here on Out?
72(3)
iDefense and ZDI
72(3)
Part II Penetration Testing and Tools
75(96)
Chapter 4 Social Engineering Attacks
77(16)
How a Social Engineering Attack Works
77(2)
Conducting a Social Engineering Attack
79(2)
Common Attacks Used in Penetration Testing
81(8)
The Good Samaritan
81(5)
The Meeting
86(2)
Join the Company
88(1)
Preparing Yourself for Face-to-Face Attacks
89(2)
Defending Against Social Engineering Attacks
91(2)
Chapter 5 Physical Penetration Attacks
93(16)
Why a Physical Penetration Is Important
94(1)
Conducting a Physical Penetration
94(3)
Reconnaissance
95(2)
Mental Preparation
97(1)
Common Ways into a Building
97(11)
The Smokers' Door
98(1)
Manned Checkpoints
99(3)
Locked Doors
102(1)
Physically Defeating Locks
103(4)
Once You Are Inside
107(1)
Defending Against Physical Penetrations
108(1)
Chapter 6 Insider Attacks
109(16)
Why Simulating an Insider Attack Is Important
109(1)
Conducting an Insider Attack
110(13)
Tools and Preparation
110(1)
Orientation
111(1)
Gaining Local Administrator Privileges
111(4)
Disabling Antivirus
115(1)
Raising Cain
116(7)
Defending Against Insider Attacks
123(2)
Chapter 7 Using the BackTrack Linux Distribution
125(16)
BackTrack: The Big Picture
125(1)
Installing BackTrack to DVD or USB Thumb Drive
126(2)
Using the BackTrack ISO Directly Within a Virtual Machine
128(3)
Creating a BackTrack Virtual Machine with VirtualBox
128(1)
Booting the BackTrack LiveDVD System
129(1)
Exploring the BackTrack X Windows Environment
130(1)
Starting Network Services
130(1)
Persisting Changes to Your BackTrack Installation
131(6)
Installing Full BackTrack to Hard Drive or USB Thumb Drive
131(3)
Creating a New ISO with Your One-time Changes
134(1)
Using a Custom File that Automatically Saves and Restores Changes
135(2)
Exploring the BackTrack Boot Menu
137(2)
Updating BackTrack
139(2)
Chapter 8 Using Metasploit
141(16)
Metasploit: The Big Picture
141(1)
Getting Metasploit
141(1)
Using the Metasploit Console to Launch Exploits
142(5)
Exploiting Client-Side Vulnerabilities with Metasploit
147(2)
Penetration Testing with Metasploit's Meterpreter
149(6)
Automating and Scripting Metasploit
155(1)
Going Further with Metasploit
156(1)
Chapter 9 Managing a Penetration Test
157(14)
Planning a Penetration Test
157(4)
Types of Penetration Tests
157(1)
Scope of a Penetration Test
158(1)
Locations of the Penetration Test
158(1)
Organization of the Penetration Testing Team
158(1)
Methodologies and Standards
159(1)
Phases of the Penetration Test
159(2)
Testing Plan for a Penetration Test
161(1)
Structuring a Penetration Testing Agreement
161(1)
Statement of Work
161(1)
Get-Out-of-Jail-Free Letter
162(1)
Execution of a Penetration Test
162(2)
Kickoff Meeting
162(1)
Access During the Penetration Test
163(1)
Managing Expectations
163(1)
Managing Problems
163(1)
Steady Is Fast
164(1)
External and Internal Coordination
164(1)
Information Sharing During a Penetration Test
164(4)
Dradis Server
164(4)
Reporting the Results of a Penetration Test
168(3)
Format of the Report
169(1)
Out Brief of the Report
169(2)
Part III Exploiting
171(240)
Chapter 10 Programming Survival Skills
173(28)
C Programming Language
173(7)
Basic C Language Constructs
173(5)
Sample Program
178(1)
Compiling with gcc
179(1)
Computer Memory
180(4)
Random Access Memory (RAM)
180(1)
Endian
180(1)
Segmentation of Memory
181(1)
Programs in Memory
181(1)
Buffers
182(1)
Strings in Memory
182(1)
Pointers
182(1)
Putting the Pieces of Memory Together
183(1)
Intel Processors
184(1)
Registers
184(1)
Assembly Language Basics
184(6)
Machine vs. Assembly vs. C
185(1)
AT&T vs. NASM
185(3)
Addressing Modes
188(1)
Assembly File Structure
189(1)
Assembling
189(1)
Debugging with gdb
190(2)
gdb Basics
190(1)
Disassembly with gdb
191(1)
Python Survival Skills
192(9)
Getting Python
192(1)
Hello World in Python
193(1)
Python Objects
193(1)
Strings
193(2)
Numbers
195(1)
Lists
196(1)
Dictionaries
197(1)
Files with Python
197(2)
Sockets with Python
199(2)
Chapter 11 Basic Linux Exploits
201(24)
Stack Operations
201(2)
Function Calling Procedure
202(1)
Buffer Overflows
203(6)
Overflow of meet.c
204(4)
Ramifications of Buffer Overflows
208(1)
Local Buffer Overflow Exploits
209(8)
Components of the Exploit
209(2)
Exploiting Stack Overflows from the Command Line
211(2)
Exploiting Stack Overflows with Generic Exploit Code
213(2)
Exploiting Small Buffers
215(2)
Exploit Development Process
217(8)
Control eip
218(1)
Determine the Offset(s)
218(3)
Determine the Attack Vector
221(1)
Build the Exploit Sandwich
222(1)
Test the Exploit
222(3)
Chapter 12 Advanced Linux Exploits
225(26)
Format String Exploits
225(11)
The Problem
225(4)
Reading from Arbitrary Memory
229(2)
Writing to Arbitrary Memory
231(2)
Taking .dtors to root
233(3)
Memory Protection Schemes
236(15)
Compiler Improvements
236(4)
Kernel Patches and Scripts
240(1)
Return to libc Exploits
241(8)
Bottom Line
249(2)
Chapter 13 Shellcode Strategies
251(16)
User Space Shellcode
251(9)
System Calls
252(1)
Basic Shellcode
252(1)
Port Binding Shellcode
253(1)
Reverse Shellcode
254(2)
Find Socket Shellcode
256(1)
Command Execution Code
257(1)
File Transfer Code
257(1)
Multistage Shellcode
258(1)
System Call Proxy Shellcode
258(1)
Process Injection Shellcode
259(1)
Other Shellcode Considerations
260(3)
Shellcode Encoding
260(1)
Self-Corrupting Shellcode
261(1)
Disassembling Shellcode
262(1)
Kernel Space Shellcode
263(4)
Kernel Space Considerations
264(3)
Chapter 14 Writing Linux Shellcode
267(30)
Basic Linux Shellcode
267(9)
System Calls
268(1)
System Calls by C
268(1)
System Calls by Assembly
269(1)
Exit System Call
269(2)
Setreuid System Call
271(1)
Shell-Spawning Shellcode with execve
272(4)
Implementing Port-Binding Shellcode
276(8)
Linux Socket Programming
276(3)
Assembly Program to Establish a Socket
279(2)
Test the Shellcode
281(3)
Implementing Reverse Connecting Shellcode
284(3)
Reverse Connecting C Program
284(1)
Reverse Connecting Assembly Program
285(2)
Encoding Shellcode
287(7)
Simple XOR Encoding
287(1)
Structure of Encoded Shellcode
288(1)
JMP/CALL XOR Decoder Example
288(1)
FNSTENV XOR Example
289(2)
Putting the Code Together
291(3)
Automating Shellcode Generation with Metasploit
294(3)
Generating Shellcode with Metasploit
294(1)
Encoding Shellcode with Metasploit
295(2)
Chapter 15 Windows Exploits
297(44)
Compiling and Debugging Windows Programs
297(7)
Compiling on Windows
297(2)
Debugging on Windows with OllyDbg
299(5)
Writing Windows Exploits
304(12)
Exploit Development Process Review
305(1)
ProSSHD Server
305(1)
Control eip
306(2)
Determine the Offset(s)
308(1)
Determine the Attack Vector
309(3)
Build the Exploit Sandwich
312(2)
Debug the Exploit if Needed
314(2)
Understanding Structured Exception Handling (SEH)
316(2)
Implementation of SEH
316(2)
Understanding Windows Memory Protections (XP SP3, Vista, 7, and Server 2008)
318(4)
Stack-Based Buffer Overrun Detection (/GS)
318(2)
Safe Structured Exception Handling (SafeSEH)
320(1)
SEH Overwrite Protection (SEHOP)
320(1)
Heap Protections
320(1)
Data Execution Prevention (DEP)
321(1)
Address Space Layout Randomization (ASLR)
321(1)
Bypassing Windows Memory Protections
322(19)
Bypassing /GS
323(1)
Bypassing SafeSEH
323(1)
Bypassing ASLR
324(1)
Bypassing DEP
325(6)
Bypassing SEHOP
331(7)
Summary of Memory Bypass Methods
338(3)
Chapter 16 Understanding and Detecting Content-Type Attacks
341(20)
How Do Content-Type Attacks Work?
341(2)
Which File Formats Are Being Exploited Today?
343(2)
Intro to the PDF File Format
345(3)
Analyzing a Malicious PDF Exploit
348(3)
Implementing Safeguards in Your Analysis Environment
350(1)
Tools to Detect Malicious PDF Files
351(7)
PDFiD
351(4)
pdf-parser.py
355(3)
Tools to Test Your Protections Against Content-type Attacks
358(1)
How to Protect Your Environment from Content-type Attacks
359(2)
Apply All Security Updates
359(1)
Disable JavaScript in Adobe Reader
359(1)
Enable DEP for Microsoft Office Application and Adobe Reader
360(1)
Chapter 17 Web Application Security Vulnerabilities
361(18)
Overview of Top Web Application Security Vulnerabilities
361(1)
Injection Vulnerabilities
361(1)
Cross-Site Scripting Vulnerabilities
362(1)
The Rest of the OWASP Top Ten
362(1)
SQL Injection Vulnerabilities
362(11)
SQL Databases and Statements
365(2)
Testing Web Applications to Find SQL Injection Vulnerabilities
367(6)
Cross-Site Scripting Vulnerabilities
373(6)
Explaining "Scripting"
373(1)
Explaining Cross-Site Scripting
374(5)
Chapter 18 VoIP Attacks
379(16)
What Is VoIP?
379(1)
Protocols Used by VoIP
380(4)
SIP
381(1)
Megaco H.248
382(1)
H.323
382(1)
TLS and DTLS
383(1)
SRTP
384(1)
ZRTP
384(1)
Types of VoIP Attacks
384(9)
Enumeration
384(2)
SIP Password Cracking
386(1)
Eavesdropping/Packet Capture
386(1)
Denial of Service
387(6)
How to Protect Against VoIP Attacks
393(2)
Chapter 19 SCADA Attacks
395(16)
What Is SCADA?
395(1)
Which Protocols Does SCADA Use?
396(3)
OPC
396(1)
ICCP
396(1)
Modbus
397(1)
DNP3
398(1)
SCADA Fuzzing
399(9)
SCADA Fuzzing with Autodafe
399(6)
SCADA Fuzzing with TFTP Daemon Fuzzer
405(3)
Stuxnet Malware (The New Wave in Cyberterrorism)
408(1)
How to Protect Against SCADA Attacks
408(3)
Part IV Vulnerability Analysis
411(222)
Chapter 20 Passive Analysis
413(32)
Ethical Reverse Engineering
413(1)
Why Bother with Reverse Engineering?
414(2)
Reverse Engineering Considerations
415(1)
Source Code Analysis
416(11)
Source Code Auditing Tools
416(2)
The Utility of Source Code Auditing Tools
418(2)
Manual Source Code Auditing
420(5)
Automated Source Code Analysis
425(2)
Binary Analysis
427(18)
Manual Auditing of Binary Code
427(14)
Automated Binary Analysis Tools
441(4)
Chapter 21 Advanced Static Analysis with IDA Pro
445(26)
Static Analysis Challenges
445(16)
Stripped Binaries
446(2)
Statically Linked Programs and FLAIR
448(6)
Data Structure Analysis
454(5)
Quirks of Compiled C++ Code
459(2)
Extending IDA Pro
461(10)
Scripting with IDC
461(3)
IDA Pro Plug-In Modules and the IDA Pro SDK
464(2)
Building IDA Pro Plug-Ins
466(2)
IDA Pro Loaders and Processor Modules
468(3)
Chapter 22 Advanced Reverse Engineering
471(24)
Why Try to Break Software?
471(1)
Overview of the Software Development Process
472(1)
Instrumentation Tools
473(11)
Debuggers
474(2)
Code Coverage Analysis Tools
476(1)
Profiling Tools
477(1)
Flow Analysis Tools
477(3)
Memory Use Monitoring Tools
480(4)
Fuzzing
484(1)
Instrumented Fuzzing Tools and Techniques
484(11)
A Simple URL Fuzzer
485(2)
Fuzzing Unknown Protocols
487(1)
SPIKE
488(1)
SPIKE Static Content Primitives
489(3)
SPIKE Proxy
492(1)
Sharefuzz
492(3)
Chapter 23 Client-Side Browser Exploits
495(30)
Why Client-Side Vulnerabilities Are Interesting
495(2)
Client-Side Vulnerabilities Bypass Firewall Protections
495(1)
Client-Side Applications Are Often Running with Administrative Privileges
496(1)
Client-Side Vulnerabilities Can Easily Target Specific People or Organizations
496(1)
Internet Explorer Security Concepts
497(2)
ActiveX Controls
497(1)
Internet Explorer Security Zones
498(1)
History of Client-Side Exploits and Latest Trends
499(7)
Client-Side Vulnerabilities Rise to Prominence
499(1)
Notable Vulnerabilities in the History of Client-Side Attacks
500(6)
Finding New Browser-Based Vulnerabilities
506(15)
mangleme
506(3)
Mozilla Security Team Fuzzers
509(1)
AxEnum
510(5)
AxFuzz
515(1)
AxMan
515(6)
Heap Spray to Exploit
521(1)
InternetExploiter
521(1)
Protecting Yourself from Client-Side Exploits
522(3)
Keep Up-to-Date on Security Patches
522(1)
Stay Informed
522(1)
Run Internet-Facing Applications with Reduced Privileges
522(3)
Chapter 24 Exploiting the Windows Access Control Model
525(54)
Why Access Control Is Interesting to a Hacker
525(1)
Most People Don't Understand Access Control
525(1)
Vulnerabilities You Find Are Easy to Exploit
526(1)
You'll Find Tons of Security Vulnerabilities
526(1)
How Windows Access Control Works
526(12)
Security Identifier
527(1)
Access Token
528(3)
Security Descriptor
531(4)
The Access Check
535(3)
Tools for Analyzing Access Control Configurations
538(5)
Dumping the Process Token
538(3)
Dumping the Security Descriptor
541(2)
Special SIDs, Special Access, and "Access Denied"
543(10)
Special SIDs
543(2)
Special Access
545(1)
Investigating "Access Denied"
545(8)
Analyzing Access Control for Elevation of Privilege
553(1)
Attack Patterns for Each Interesting Object Type
554(19)
Attacking Services
554(6)
Attacking Weak DACLs in the Windows Registry
560(4)
Attacking Weak Directory DACLs
564(5)
Attacking Weak File DACLs
569(4)
What Other Object Types Are Out There?
573(6)
Enumerating Shared Memory Sections
573(1)
Enumerating Named Pipes
574(1)
Enumerating Processes
575(1)
Enumerating Other Named Kernel Objects (Semaphores, Mutexes, Events, Devices)
576(3)
Chapter 25 Intelligent Fuzzing with Sulley
579(16)
Protocol Analysis
579(2)
Sulley Fuzzing Framework
581(14)
Installing Sulley
581(1)
Powerful Fuzzer
581(3)
Blocks
584(4)
Monitoring the Process for Faults
588(1)
Monitoring the Network Traffic
589(1)
Controlling VMware
589(1)
Putting It All Together
590(2)
Postmortem Analysis of Crashes
592(1)
Analysis of Network Traffic
593(1)
Exploring Further
594(1)
Chapter 26 From Vulnerability to Exploit
595(22)
Exploitability
596(5)
Debugging for Exploitation
596(1)
Initial Analysis
597(4)
Understanding the Problem
601(10)
Preconditions and Postconditions
602(1)
Repeatability
603(8)
Payload Construction Considerations
611(3)
Payload Protocol Elements
612(1)
Buffer Orientation Problems
612(1)
Self-Destructive Shellcode
613(1)
Documenting the Problem
614(3)
Background Information
614(1)
Circumstances
614(1)
Research Results
615(2)
Chapter 27 Closing the Holes: Mitigation
617(16)
Mitigation Alternatives
617(2)
Port Knocking
618(1)
Migration
618(1)
Patching
619(14)
Source Code Patching Considerations
620(2)
Binary Patching Considerations
622(4)
Binary Mutation
626(5)
Third-Party Patching Initiatives
631(2)
Part V Malware Analysis
633(40)
Chapter 28 Collecting Malware and Initial Analysis
635(22)
Malware
635(2)
Types of Malware
635(1)
Malware Defensive Techniques
636(1)
Latest Trends in Honeynet Technology
637(7)
Honeypots
637(1)
Honeynets
637(1)
Why Honeypots Are Used
637(1)
Limitations of Honeypots
638(1)
Low-Interaction Honeypots
639(1)
High-Interaction Honeypots
639(1)
Types of Honeynets
640(2)
Thwarting VMware Detection Technologies
642(2)
Catching Malware: Setting the Trap
644(2)
VMware Host Setup
644(1)
VMware Guest Setup
644(1)
Using Nepenthes to Catch a Fly
644(2)
Initial Analysis of Malware
646(11)
Static Analysis
646(2)
Live Analysis
648(5)
Norman SandBox Technology
653(4)
Chapter 29 Hacking Malware
657(16)
Trends in Malware
657(3)
Embedded Components
657(1)
Use of Encryption
658(1)
User Space Hiding Techniques
658(1)
Use of Rootkit Technology
659(1)
Persistence Measures
659(1)
De-obfuscating Malware
660(9)
Packer Basics
660(1)
Unpacking Binaries
661(8)
Reverse-Engineering Malware
669(4)
Malware Setup Phase
670(1)
Malware Operation Phase
670(1)
Automated Malware Analysis
671(2)
Index 673
Shon Harris is the founder and CEO of Logical Security LLC, an information security consultant, a former engineer in the Air Forces Information Warfare unit, an instructor and an author. She has authored several international bestselling books on information security published by McGraw-Hill and Pearson which has sold over a million copies and have been translated into six languages. Ms. Harris authors academic textbooks, security articles for publication and is a technical editor for Information Security Magazine. Ms. Harris has consulted for a large number of organizations in every business sector (financial, medical, retail, entertainment, utility) and several U.S. government agencies over the last 18 years. Ms. Harris provides high-end, advanced and specialized consulting for organizations globally. She also works directly with law firms as a technical and expert witness on cases that range from patent infringement, criminal investigations, civil lawsuits and she specializes in cryptographic technologies. Ms. Harris has taught information security to a wide range of clients over the last 18 years, some of which have included; West Point, Microsoft, DHS, DoD, DoE, NSA, FBI, NASA, CDC, PWC, DISA, RSA, Visa, Intel, Cisco, Oracle, HP, Boeing, Northrop Grumman, Shell, Verizon, Citi, BoA, HSBC, Morgan Stanley, Symantec, Warner Brothers, Bridgestone, American Express, etc. Ms. Harris was recognized as one of the top 25 women in the Information Security field by Information Security Magazine.