Table of Contents for
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition by Stephen Sims Published by McGraw-Hill Osborne Media, 2015
  1. Cover
  2. Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
  7. Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
  8. Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
  9. Contents
  10. Preface
  11. Acknowledgments
  12. Introduction
  13. Part I Crash Course: Preparing for the War
  14. Chapter 1 Ethical Hacking and the Legal System
  15. Chapter 2 Programming Survival Skills
  16. Chapter 3 Static Analysis
  17. Chapter 4 Advanced Analysis with IDA Pro
  18. Chapter 5 World of Fuzzing
  19. Chapter 6 Shellcode Strategies
  20. Chapter 7 Writing Linux Shellcode
  21. Part II From Vulnerability to Exploit
  22. Chapter 8 Spoofing-Based Attacks
  23. Chapter 9 Exploiting Cisco Routers
  24. Chapter 10 Basic Linux Exploits
  25. Chapter 11 Advanced Linux Exploits
  26. Chapter 12 Windows Exploits
  27. Chapter 13 Bypassing Windows Memory Protections
  28. Chapter 14 Exploiting the Windows Access Control Model
  29. Chapter 15 Exploiting Web Applications
  30. Chapter 16 Exploiting IE: Smashing the Heap
  31. Chapter 17 Exploiting IE: Use-After-Free Technique
  32. Chapter 18 Advanced Client-Side Exploitation with BeEF
  33. Chapter 19 One-Day Exploitation with Patch Diffing
  34. Part III Advanced Malware Analysis
  35. Chapter 20 Dissecting Android Malware
  36. Chapter 21 Dissecting Ransomware
  37. Chapter 22 Analyzing 64-bit Malware
  38. Chapter 23 Next-Generation Reverse Engineering
  39. Appendix About the Download
  40. Index
  41. Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition

 

 

ACKNOWLEDGMENTS

Each of the authors would like to thank the staff at McGraw-Hill Education. In particular, we would like to thank Meghan Manfre and Mary Demery. You really kept us on track and helped us through the process. Your dedication to this project was truly noteworthy. Thanks.

Daniel Regalado le gustaría agradecer primero a Dios por permitirle conocerlo y cambiar su vida, a mi esposa Diana por aguantar tantas noches sin su esposo en la recamara, por su paciencia y ternura recibida, te amo! A mis hijos Fercho y Andrick por enseñarme que la vida es bella y finalmente pero no menos importante a la Familia Regalado Arias: Fernando, Adelina, Susana Erwin y Belem que desde que empecé este libro soñé con dedicárselos y que aunque disto mucho de ser el mejor profesional ellos me hacen sentir como tal, los amo y que Viva México! 

Shon Harris would like to thank the other authors and the team members for their continued dedication to this project and continual contributions to the industry as a whole. Shon would also like to thank the crazy Fairbairn sisters—Kathy Conlon, Diane Marshall, and Kristy Gorenz for their lifelong support of Shon and her efforts.

Allen Harper would like to thank his wonderful wife, Corann, and daughters, Haley and Madison, for their support and understanding. It is wonderful to see our family grow stronger in Christ each year. I love you each dearly. In addition, Allen would like to thank the members of his Church for their love and support. In particular, Ronnie Jones, Bob Poole, and Donovan Smith have been true brothers in the Lord and great friends.

Chris Eagle would like to thank all his students past, present, and future for keeping him motivated to do what he loves.

Jonathan Ness would like to thank Jessica, his amazing wife, for tolerating the long hours required for him to write this book (and hold his job, and his second job, and third “job,” and all the side projects). Thanks also to the experts who freely contributed insights for the book: Didier Stevens for the generous PDF analysis help (and for providing the free PDF analysis tools at http://blog.didierstevens.com/programs/pdf-tools), Terry McCorkle for the web vulnerabilities guidance and advice, and John Lambert for his insight into the Windows security model. Finally, Jonathan would like to thank the mentors, teachers, coworkers, pastors, family, and friends who have guided him along his way, contributing more to his success than they’ll ever know.

Branko Spasojevic would like to thank his mother, sisters, and grandparents for all the support and knowledge they passed on. Another big thanks goes to the friends and all the people who share their knowledge for free to benefit everyone. Some people who deserve special mention are: Sandra, Lina, Toni, Luka, Bojan, Leon, Ante, Hrvoje, Aleksandar, Franjo, Domagoj, Daniel, Santi, Keith, Piotr, and Andrea.

Ryan Linn would like to thank Heather for her support, encouragement, and advice as well as his family and friends for their support and for putting up with the long hours and infrequent communication while the book was coming together. Thanks also go out to Ed Skoudis for pushing me to do awesome things, and to HD, Egypt, Nate, Shawn, and all the other friends and family who have offered code assistance, guidance, and support when I’ve needed it the most.

Stephen Sims would like to thank his wife, LeAnne, and daughter, Audrey, for their ongoing support with the time needed to research, write, work, teach, and travel. Stephen would also like to thank his parents, George and Mary, and sister, Lisa, for their support from afar. Finally, a special thanks to all of the brilliant security researchers who contribute so much to the community with publications, lectures, and tools.

We, the authors, would also like to collectively thank Hex-Rays and Nicolas Falliere for the generous use of their tools IDA Pro and JEB.