Gray hat hacking the ethical hacker's handbook
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition explains...
Otros Autores: | , , , , , , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
New York, New York State :
McGraw-Hill Education
2018.
|
Edición: | Fifth edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630524706719 |
Tabla de Contenidos:
- Why gray hat hacking? Ethics and law
- Programming survival skills
- Next-generation fuzzing
- Next-generation reverse engineering
- Software-defined radio
- So you want to be a pen tester?
- Red teaming operations
- Purple teaming
- Bug bounty programs
- Exploiting systems
- Getting shells without exploits
- Basic Linux exploits
- Advanced Linux exploits
- Windows exploits
- Advanced Windows exploitation
- PowerShell exploitation
- Next-generation web application exploitation
- Next-generation patch exploitation
- Dissecting mobile malware
- Dissecting ransomware
- ATM malware
- Deception: next-generation honeypots
- Internet of things
- Internet of things to be hacked
- Dissecting embedded devices
- Exploiting embedded devices
- Fighting IoT malware.