Table of Contents for
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
Close
Version ebook
/
Retour
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition, 4th Edition
by Stephen Sims
Published by McGraw-Hill Osborne Media, 2015
Cover
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Title Page
Copyright Page
Dedication
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Contents
Preface
Acknowledgments
Introduction
Part I Crash Course: Preparing for the War
Chapter 1 Ethical Hacking and the Legal System
Chapter 2 Programming Survival Skills
Chapter 3 Static Analysis
Chapter 4 Advanced Analysis with IDA Pro
Chapter 5 World of Fuzzing
Chapter 6 Shellcode Strategies
Chapter 7 Writing Linux Shellcode
Part II From Vulnerability to Exploit
Chapter 8 Spoofing-Based Attacks
Chapter 9 Exploiting Cisco Routers
Chapter 10 Basic Linux Exploits
Chapter 11 Advanced Linux Exploits
Chapter 12 Windows Exploits
Chapter 13 Bypassing Windows Memory Protections
Chapter 14 Exploiting the Windows Access Control Model
Chapter 15 Exploiting Web Applications
Chapter 16 Exploiting IE: Smashing the Heap
Chapter 17 Exploiting IE: Use-After-Free Technique
Chapter 18 Advanced Client-Side Exploitation with BeEF
Chapter 19 One-Day Exploitation with Patch Diffing
Part III Advanced Malware Analysis
Chapter 20 Dissecting Android Malware
Chapter 21 Dissecting Ransomware
Chapter 22 Analyzing 64-bit Malware
Chapter 23 Next-Generation Reverse Engineering
Appendix About the Download
Index
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Prev
Previous Chapter
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Next
Next Chapter
Copyright Page
Prev
Previous Chapter
Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition
Next
Next Chapter
Copyright Page