Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
<h4>Cutting-edge techniques for finding and fixing critical security flaws</h4><br /><br /><p>Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, <i>Gray Hat Hacking: The Ethical Hacker's Handbook</i>, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource.</p><br /><br /><ul> <li>Build and launch spoofing exploits with Ettercap and Evilgrade</li><br /><br /><li>Induce error conditions and crash software using fuzzers</li><br /><br /><li>Hack Cisco routers, switches, and network hardware</li><br /><br /><li>Use advanced reverse engineering to exploit Windows and Linux software</li><br /><br /><li>Bypass Windows Access Control and memory protection schemes</li><br /><br /><li>Scan for flaws in Web applications using Fiddler and the x5 plugin</li><br /><br /><li>Learn the use-after-free technique used in recent zero days</li><br /><br /><li>Bypass Web authentication via MySQL type conversion and MD5 injection attacks</li><br /><br /><li>Inject your shellcode into a browser's memory using the latest Heap Spray techniques</li><br /><br /><li>Hijack Web browsers with Metasploit and the BeEF Injection Framework</li><br /><br /><li>Neutralize ransomware before it takes control of your desktop</li><br /><br /><li>Dissect Android malware with JEB and DAD decompilers</li><br /><br /><li>Find one-day vulnerabilities with binary diffing</li><br /><br /></ul><br /><br /><p></p>