Grey Hat Hacking: The Ethical Hackers Handbook
5th Edition
9390385296
·
9789390385294
© 2021 | Published: October 14, 2020
OVERVIEWThis fully updated, industry-standard security resource shows how to fortify computernetworks by learning and effectively applying ethical hacking techniques. Based oncritical topics that the authors teach at major security conferences and co…
Read More
Chapter 1: Why Gray Hat hacking? Ethics and Law
Chapter 2: Programming Survival Skills
Chapter 3: Next Generation Fuzzing
Chapter 4: Next Generation Reverse Engineering
Chapter 5: Software Defined Radios (SDR)
Part 2: Business of Hacking
Chapter 6: So You Want to Be a Pentester?
Chapter 7: Red Team vs. Blue Team
Chapter 8: Next Generation Security Operations
Chapter 9: Bug Bounty Programs
Part 3: Exploiting Systems
Chapter 10: Getting Shells without Exploits
Chapter 11: Basic Linux Exploits
Chapter 12: Advance Linux Exploits
Chapter 13: Windows Exploits
Chapter 14: Bypassing Windows Memory Protections
Chapter 15: Powershell Exploitation
Chapter 16: Next Generation Exploitation of Web Applications
Chapter 17: Next Generation Patch Exploitation
Part 4: Advanced Malware Analysis
Chapter 18: Dissecting Mobile Malware
Chapter 19: Dissecting Ransomware
Chapter 20: ATM Malware
Chapter 21: Deception: Next Generation Honeypots
Part 5: Internet of Things (IoT)
Chapter 22: Internet of Things to be Hacked
Chapter 23: Dissecting Embedded Devices
Chapter 24: Exploiting Embedded Devices
Chapter 25: Exploiting the Internet of Things
Chapter 2: Programming Survival Skills
Chapter 3: Next Generation Fuzzing
Chapter 4: Next Generation Reverse Engineering
Chapter 5: Software Defined Radios (SDR)
Part 2: Business of Hacking
Chapter 6: So You Want to Be a Pentester?
Chapter 7: Red Team vs. Blue Team
Chapter 8: Next Generation Security Operations
Chapter 9: Bug Bounty Programs
Part 3: Exploiting Systems
Chapter 10: Getting Shells without Exploits
Chapter 11: Basic Linux Exploits
Chapter 12: Advance Linux Exploits
Chapter 13: Windows Exploits
Chapter 14: Bypassing Windows Memory Protections
Chapter 15: Powershell Exploitation
Chapter 16: Next Generation Exploitation of Web Applications
Chapter 17: Next Generation Patch Exploitation
Part 4: Advanced Malware Analysis
Chapter 18: Dissecting Mobile Malware
Chapter 19: Dissecting Ransomware
Chapter 20: ATM Malware
Chapter 21: Deception: Next Generation Honeypots
Part 5: Internet of Things (IoT)
Chapter 22: Internet of Things to be Hacked
Chapter 23: Dissecting Embedded Devices
Chapter 24: Exploiting Embedded Devices
Chapter 25: Exploiting the Internet of Things
OVERVIEW
This fully updated, industry-standard security resource shows how to fortify computer
networks by learning and effectively applying ethical hacking techniques. Based on
critical topics that the authors teach at major security conferences and colleges, the
book features actionable planning and analysis methods as well as practical steps for
identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition, clearly explains the
enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case
studies, and interesting labs. Readers will get complete coverage of penetration
testing, vulnerability discovery, malware analysis, reverse engineering, and Internet of
Things security. State-of-the-art mobile exploits, ransomware, and legal issues are
thoroughly explained.
KEY FEATURES
• Fully revised content—features 13 brand-new chapters
• Includes current techniques to analyze and block ransomware
• Written by a team of computer security experts
This fully updated, industry-standard security resource shows how to fortify computer
networks by learning and effectively applying ethical hacking techniques. Based on
critical topics that the authors teach at major security conferences and colleges, the
book features actionable planning and analysis methods as well as practical steps for
identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition, clearly explains the
enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case
studies, and interesting labs. Readers will get complete coverage of penetration
testing, vulnerability discovery, malware analysis, reverse engineering, and Internet of
Things security. State-of-the-art mobile exploits, ransomware, and legal issues are
thoroughly explained.
KEY FEATURES
• Fully revised content—features 13 brand-new chapters
• Includes current techniques to analyze and block ransomware
• Written by a team of computer security experts