Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
<p><b>Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, <span style="white-space:pre"></span>authenticity, or access to any online entitlements included with the product.</b></p><p><b><br></b></p><p><b>Cutting-edge techniques for finding and fixing critical security flaws</b></p><p>Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, <i>Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition</i> explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.</p><p>•<span style="white-space:pre"></span>Build and launch spoofing exploits with Ettercap</p><p>•<span style="white-space:pre"></span>Induce error conditions and crash software using fuzzers</p><p>•<span style="white-space:pre"></span>Use advanced reverse engineering to exploit Windows and Linux software</p><p>•<span style="white-space:pre"></span>Bypass Windows Access Control and memory protection schemes</p><p>•<span style="white-space:pre"></span>Exploit web applications with Padding Oracle Attacks</p><p>•<span style="white-space:pre"></span>Learn the use-after-free technique used in recent zero days</p><p>•<span style="white-space:pre"></span>Hijack web browsers with advanced XSS attacks</p><p>•<span style="white-space:pre"></span>Understand ransomware and how it takes control of your desktop</p><p>•<span style="white-space:pre"></span>Dissect Android malware with JEB and DAD decompilers</p><p>•<span style="white-space:pre"></span>Find one-day vulnerabilities with binary diffing</p><p>•<span style="white-space:pre"></span>Exploit wireless systems with Software Defined Radios (SDR)</p><p>•<span style="white-space:pre"></span>Exploit Internet of things devices</p><p>•<span style="white-space:pre"></span>Dissect and exploit embedded devices</p><p>•<span style="white-space:pre"></span>Understand bug bounty programs</p><p>•<span style="white-space:pre"></span>Deploy next-generation honeypots</p><p>•<span style="white-space:pre"></span>Dissect ATM malware and analyze common ATM attacks</p><p>•<span style="white-space:pre"></span>Learn the business side of ethical hacking</p><p><br></p>