Gray Hat Hacking: The Ethical Hacker’s Handbook Sixth Edition – Ebook PDF Instant Delivery – ISBN(s): 9781264268948,1264268947,9781264268955,1264268955
Product details:
- ISBN-10 : 1264268955
- ISBN-13 : 9781264268955
- Author: Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez , Moses Frost
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.
Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition clearly explains the enemy’s devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained.
Table contents:
Part I: Preparation
1 Gray Hat Hacking
2 Programming Survival Skills
3 Linux Exploit Development Tools
4 Introduction to Ghidra
5 IDA Pro
Part II: Ethical Hacking
6 Red and Purple Teams
7 Command and Control (C2)
8 Building a Threat Hunting Lab
9 Introduction to Threat Hunting
Part III: Hacking Systems
10 Basic Linux Exploits
11 Advanced Linux Exploits
12 Linux Kernel Exploits
13 Basic Windows Exploitation
14 Windows Kernel Exploitation
15 PowerShell Exploitation
16 Getting Shells Without Exploits
17 Post-Exploitation in Modern Windows Environments
18 Next-Generation Patch Exploitation
Part IV: Hacking IoT
19 Internet of Things to Be Hacked
20 Dissecting Embedded Devices
21 Exploiting Embedded Devices
22 Software-Defined Radio
Part V: Hacking Hypervisors
23 Hypervisors 101
24 Creating a Research Framework
25 Inside Hyper-V
26 Hacking Hypervisors Case Study
Part VI: Hacking the Cloud
27 Hacking in Amazon Web Services
28 Hacking in Azure
29 Hacking Containers
30 Hacking on Kubernetes
People also search:
grey hat hackers examples
what is a grey hat hackers
what is the difference between black- white- and gray-hat hacking
gray hat hacker book
grey hat hacking book 6th edition pdf