- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.*Build and launch spoofing exploits with Ettercap*Induce error conditions and crash software using fuzzers*Use advanced reverse engineering to exploit Windows and Linux software*Bypass Windows Access Control and memory protection schemes*Exploit web applications with Padding Oracle Attacks*Learn the use-after-free technique used in recent zero days*Hijack web browsers with advanced XSS attacks*Understand ransomware and how it takes control of your desktop*Dissect Android malware with JEB and DAD decompilers*Find one-day vulnerabilities with binary diffing*Exploit wireless systems with Software Defined Radios (SDR)*Exploit Internet of things devices*Dissect and exploit embedded devices*Understand bug bounty programs*Deploy next-generation honeypots*Dissect ATM malware and analyze common ATM attacks*Learn the business side of ethical hacking
Contents
Part 1Chapter 1: Why Gray Hat hacking? Ethics and LawChapter 2: Programming Survival SkillsChapter 3: Next Generation FuzzingChapter 4: Next Generation Reverse EngineeringChapter 5: Software Defined Radios (SDR)Part 2: Business of HackingChapter 6: So You Want to Be a Pentester?Chapter 7: Red Team vs. Blue TeamChapter 8: Next Generation Security OperationsChapter 9: Bug Bounty ProgramsPart 3: Exploiting SystemsChapter 10: Getting Shells without ExploitsChapter 11: Basic Linux ExploitsChapter 12: Advance Linux ExploitsChapter 13: Windows ExploitsChapter 14: Bypassing Windows Memory ProtectionsChapter 15: Powershell ExploitationChapter 16: Next Generation Exploitation of Web ApplicationsChapter 17: Next Generation Patch ExploitationPart 4: Advanced Malware AnalysisChapter 18: Dissecting Mobile MalwareChapter 19: Dissecting RansomwareChapter 20: ATM MalwareChapter 21: Deception: Next Generation HoneypotsPart 5: Internet of Things (IoT)Chapter 22: Internet of Things to be HackedChapter 23: Dissecting Embedded DevicesChapter 24: Exploiting Embedded DevicesChapter 25: Exploiting the Internet of ThingsNER(01): WOW