Praise for Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition (2015)
PART I. Crash Course: Preparing for the War
CHAPTER 1. Ethical Hacking and the Legal System
CHAPTER 2. Programming Survival Skills
CHAPTER 4. Advanced Analysis with IDA Pro
CHAPTER 6. Shellcode Strategies
CHAPTER 7. Writing Linux Shellcode
PART II. From Vulnerability to Exploit
CHAPTER 8. Spoofing-Based Attacks
CHAPTER 9. Exploiting Cisco Routers
CHAPTER 10. Basic Linux Exploits
CHAPTER 11. Advanced Linux Exploits
CHAPTER 13. Bypassing Windows Memory Protections
CHAPTER 14. Exploiting the Windows Access Control Model
CHAPTER 15. Exploiting Web Applications
CHAPTER 16. Exploiting IE: Smashing the Heap
CHAPTER 17. Exploiting IE: Use-After-Free Technique
CHAPTER 18. Advanced Client-Side Exploitation with BeEF
CHAPTER 19. One-Day Exploitation with Patch Diffing
PART III. Advanced Malware Analysis
CHAPTER 20. Dissecting Android Malware
CHAPTER 21. Dissecting Ransomware
CHAPTER 22. Analyzing 64-bit Malware
CHAPTER 23. Next-Generation Reverse Engineering