9780071832380-0071832386-Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

ISBN-13: 9780071832380
ISBN-10: 0071832386
Edition: 4
Author: Shon Harris, Chris Eagle, Allen Harper, Ryan Linn, Stephen Sims, Daniel Regalado, Branko Spasojevic, Jonathan Ness
Publication date: 2015
Publisher: McGraw-Hill Education
Format: Paperback 656 pages
FREE US shipping
Buy

From $60.00

Book details

ISBN-13: 9780071832380
ISBN-10: 0071832386
Edition: 4
Author: Shon Harris, Chris Eagle, Allen Harper, Ryan Linn, Stephen Sims, Daniel Regalado, Branko Spasojevic, Jonathan Ness
Publication date: 2015
Publisher: McGraw-Hill Education
Format: Paperback 656 pages

Summary

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition (ISBN-13: 9780071832380 and ISBN-10: 0071832386), written by authors Shon Harris, Chris Eagle, Allen Harper, Ryan Linn, Stephen Sims, Daniel Regalado, Branko Spasojevic, Jonathan Ness, was published by McGraw-Hill Education in 2015. With an overall rating of 4.2 stars, it's a notable title among other Networking & Cloud Computing (Network Security, Security & Encryption, Hacking, Encryption, Viruses, Cryptography) books. You can easily purchase or rent Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition (Paperback) from BooksRun, along with many other new and used Networking & Cloud Computing books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.35.

Description

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.

  • Build and launch spoofing exploits with Ettercap and Evilgrade
  • Induce error conditions and crash software using fuzzers
  • Hack Cisco routers, switches, and network hardware
  • Use advanced reverse engineering to exploit Windows and Linux software
  • Bypass Windows Access Control and memory protection schemes
  • Scan for flaws in Web applications using Fiddler and the x5 plugin
  • Learn the use-after-free technique used in recent zero days
  • Bypass Web authentication via MySQL type conversion and MD5 injection attacks
  • Inject your shellcode into a browser's memory using the latest Heap Spray techniques
  • Hijack Web browsers with Metasploit and the BeEF Injection Framework
  • Neutralize ransomware before it takes control of your desktop
  • Dissect Android malware with JEB and DAD decompilers
  • Find one-day vulnerabilities with binary diffing
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book