Gray Hat Hacking The Ethical Hacker Handbook Fifth Edition by Daniel Regalado, Shon Harris, Allen Harper – Ebook PDF Instant Download/Delivery.9781260108422, 1260108422
Full download Gray Hat Hacking The Ethical Hacker Handbook Fifth Edition after payment
Product details:
ISBN 10: 1260108422
ISBN 13: 9781260108422
Author: Daniel Regalado; Shon Harris; Allen Harper; Chris Eagle; Jonathan Ness; Branko Spasojevic; Ryan Linn
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks •Understand ransomware and how it takes control of your desktop •Dissect Android malware with JEB and DAD decompilers •Find one-day vulnerabilities with binary diffing •Exploit wireless systems with Software Defined Radios (SDR) •Exploit Internet of things devices •Dissect and exploit embedded devices •Understand bug bounty programs •Deploy next-generation honeypots •Dissect ATM malware and analyze common ATM attacks •Learn the business side of ethical hacking
Gray Hat Hacking The Ethical Hacker Handbook Fifth Table of contents:
Part I: Preparation
Chapter 1: Why Gray Hat Hacking? Ethics and Law
- Know Your Enemy
- The Current Security Landscape
- Recognizing an Attack
- The Gray Hat Way
- Emulating the Attack
- Frequency and Focus of Testing
- Evolution of Cyberlaw
- Understanding Individual Cyberlaws
- Summary
- References
Chapter 2: Programming Survival Skills
- C Programming Language
- Basic C Language Constructs
- Sample Program
- Compiling with gcc
- Computer Memory
- Random Access Memory
- Endian
- Segmentation of Memory
- Programs in Memory
- Buffers
- Strings in Memory
- Pointers
- Putting the Pieces of Memory Together
- Intel Processors
- Registers
- Assembly Language Basics
- Machine vs. Assembly vs. C
- AT&T vs. NASM
- Addressing Modes
- Assembly File Structure
- Assembling
- Debugging with gdb
- gdb Basics
- Disassembly with gdb
- Python Survival Skills
- Getting Python
- “Hello, World!” in Python
- Python Objects
- Strings
- Numbers
- Lists
- Dictionaries
- Files with Python
- Sockets with Python
- Summary
- For Further Reading
- References
Chapter 3: Next-Generation Fuzzing
- Introduction to Fuzzing
- Types of Fuzzers
- Mutation Fuzzers
- Generation Fuzzers
- Genetic Fuzzing
- Mutation Fuzzing with Peach
- Lab 3-1: Mutation Fuzzing with Peach
- Generation Fuzzing with Peach
- Crash Analysis
- Lab 3-2: Generation Fuzzing with Peach
- Genetic or Evolutionary Fuzzing with AFL
- Lab 3-3: Genetic Fuzzing with AFL
- Summary
- For Further Reading
Chapter 4: Next-Generation Reverse Engineering
- Code Annotation
- IDB Annotation with IDAscope
- C++ Code Analysis
- Collaborative Analysis
- Leveraging Collaborative Knowledge Using FIRST
- Collaboration with BinNavi
- Dynamic Analysis
- Automated Dynamic Analysis with Cuckoo Sandbox
- Bridging the Static-Dynamic Tool Gap with Labeless
- Summary
- For Further Reading
- References
Chapter 5: Software-Defined Radio
- Getting Started with SDR
- What to Buy
- Not So Quick: Know the Rules
- Learn by Example
- Search
- Capture
- Replay
- Analyze
- Preview
- Execute
- Summary
- For Further Reading
Part II: Business of Hacking
Chapter 6: So You Want to Be a Pen Tester?
- The Journey from Novice to Expert
- Pen Tester Ethos
- Pen Tester Taxonomy
- The Future of Hacking
- Know the Tech
- Know What Good Looks Like
- Pen Tester Training
- Practice
- Degree Programs
- Knowledge Transfer
- Pen Tester Tradecraft
- Personal Liability
- Being the Trusted Advisor
- Managing a Pen Test
- Summary
- For Further Reading
Chapter 7: Red Teaming Operations
- Red Team Operations
- Strategic, Operational, and Tactical Focus
- Assessment Comparisons
- Red Teaming Objectives
- What Can Go Wrong
- Limited Scope
- Limited Time
- Limited Audience
- Overcoming Limitations
- Communications
- Planning Meetings
- Defining Measurable Events
- Understanding Threats
- Attack Frameworks
- Testing Environment
- Adaptive Testing
- External Assessment
- Physical Security Assessment
- Social Engineering
- Internal Assessment
- Lessons Learned
- Summary
- References
Chapter 8: Purple Teaming
- Introduction to Purple Teaming
- Blue Team Operations
- Know Your Enemy
- Know Yourself
- Security Program
- Incident Response Program
- Common Blue Teaming Challenges
- Purple Teaming Operations
- Decision Frameworks
- Disrupting the Kill Chain
- Kill Chain Countermeasure Framework
- Communication
- Purple Team Optimization
- Summary
- For Further Reading
- References
Chapter 9: Bug Bounty Programs
- History of Vulnerability Disclosure
- Full Vendor Disclosure
- Full Public Disclosure
- Responsible Disclosure
- No More Free Bugs
- Bug Bounty Programs
- Types of Bug Bounty Programs
- Incentives
- Controversy Surrounding Bug Bounty Programs
- Popular Bug Bounty Program Facilitators
- Bugcrowd in Depth
- Program Owner Web Interface
- Program Owner API Example
People also search for Gray Hat Hacking The Ethical Hacker Handbook Fifth :
gray hat hacking the ethical hacker’s handbook
gray hat hacking the ethical hacker’s handbook sixth edition
gray hat hacking the ethical hacker’s handbook sixth edition github
gray hat hacking the ethical hacker’s handbook 6th edition