Specifications
book-author | Daniel Regalado, Shon Harris, Alien Harper, Chris Eagle, Jonathan Ness, Branko Spasojevic, Ryan Linn, Stephen Sims |
---|---|
publisher | McGraw-Hill Education; 5th Edition |
file-type | |
pages | 640 pages |
language | English |
asin | B07D3J9J4H |
isbn10 | 1260108414 |
isbn13 | 9781260108415 |
Book Description
Comprehensively revised with the addition of thirteen new chapters; Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition presents field-tested solutions, case studies, and ready-to-use testing facilities. It also discusses the enemy's current abilities, weapons, and tactics. Protect your network and avert a digital disaster with tactics that have been tried and tested by an experienced team of security professionals. Find out how hackers acquire access, how they script and inject harmful code, how they take control of network devices, and how they hijack Web applications and browsers. In this cutting-edge reference, topics such as reverse engineering methods, Android-based exploits, and rand cyber legislation are discussed in extensive detail. In addition, the issue of utilizing the potential of the Internet of Things is presented for the first time in this most recent fifth edition.
- Innovative methods for locating and correcting crucial vulnerabilities in security systems
- Make use of the devices connected to the internet of things.
- Get familiar with bug bounty programs.
- Honeypots of the next generation should be deployed.
- Examine and take advantage of embedded gadgets.
- Gain an understanding of the more businesslike aspects of ethical hacking.
- Binary diffing can be used to locate vulnerabilities that are only valid for one day.
- Ettercap allows users to construct and execute spoofing exploits.
- Web browsers can be taken over using sophisticated XSS attacks.
- Padding Oracle Attacks should be used to exploit online applications.
- Examine malicious software installed on ATMs and reflect on typical ATM assaults.
- Utilizing Fuzzers, one can produce error situations and cause software to crash.
- Study the use-after-free strategy that was implemented in the most recent zero days.
- Android decompilers DAD and JEB can be used to analyze malicious software.
- Utilize Software Defined Radios to get the most out of wireless systems (SDR)
- Acquire an understanding of ransomware and the process by which it commandeers your desktop.
- Avoid gaining access to the windows. Control mechanisms and memory security protocols
- Take advantage of Windows and Linux applications by using sophisticated reverse engineering.
Reviews
There are no reviews yet