9781260108415

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

by ; ; ; ; ; ; ; ;
  • ISBN13:

    9781260108415

  • ISBN10:

    1260108414

  • Edition: 5th
  • Format: Paperback
  • Copyright: 2018-06-08
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $3.44
    Check/Direct Deposit: $3.28
    PayPal: $3.28
List Price: $60.00 Save up to $18.00
  • Rent Book $42.00
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    IN STOCK USUALLY SHIPS IN 24 HOURS

Supplemental Materials

What is included with this book?

Table of Contents

Part 1: Preparation
Chapter 1: Why Gray Hat hacking? Ethics and Law
Chapter 2: Programming Survival Skills
Chapter 3: Next Generation Fuzzing
Chapter 4: Next Generation Reverse Engineering
Chapter 5: Software Defined Radios (SDR)

Part 2: Business of Hacking
Chapter 6: So You Want to Be a Pentester?
Chapter 7: Red Team vs. Blue Team
Chapter 8: Next Generation Security Operations
Chapter 9: Bug Bounty Programs

Part 3: Exploiting Systems
Chapter 10: Getting Shells without Exploits
Chapter 11: Basic Linux Exploits
Chapter 12: Advance Linux Exploits
Chapter 13: Windows Exploits
Chapter 14: Bypassing Windows Memory Protections
Chapter 15: Powershell Exploitation
Chapter 16: Next Generation Exploitation of Web Applications
Chapter 17: Next Generation Patch Exploitation

Part 4: Advanced Malware Analysis
Chapter 18: Dissecting Mobile Malware
Chapter 19: Dissecting Ransomware
Chapter 20: ATM Malware
Chapter 21: Deception: Next Generation Honeypots

Part 5: Internet of Things (IoT)
Chapter 22: Internet of Things to be Hacked
Chapter 23: Dissecting Embedded Devices
Chapter 24: Exploiting Embedded Devices
Chapter 25: Exploiting the Internet of Things

Rewards Program

Write a Review