Praise for Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition (2015)

Praise for Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition (2015)

INTRODUCTION

PART I. Crash Course: Preparing for the War

CHAPTER 1. Ethical Hacking and the Legal System

CHAPTER 2. Programming Survival Skills

CHAPTER 3. Static Analysis

CHAPTER 4. Advanced Analysis with IDA Pro

CHAPTER 5. World of Fuzzing

CHAPTER 6. Shellcode Strategies

CHAPTER 7. Writing Linux Shellcode

PART II. From Vulnerability to Exploit

CHAPTER 8. Spoofing-Based Attacks

CHAPTER 9. Exploiting Cisco Routers

CHAPTER 10. Basic Linux Exploits

CHAPTER 11. Advanced Linux Exploits

CHAPTER 12. Windows Exploits

CHAPTER 13. Bypassing Windows Memory Protections

CHAPTER 14. Exploiting the Windows Access Control Model

CHAPTER 15. Exploiting Web Applications

CHAPTER 16. Exploiting IE: Smashing the Heap

CHAPTER 17. Exploiting IE: Use-After-Free Technique

CHAPTER 18. Advanced Client-Side Exploitation with BeEF

CHAPTER 19. One-Day Exploitation with Patch Diffing

PART III. Advanced Malware Analysis

CHAPTER 20. Dissecting Android Malware

CHAPTER 21. Dissecting Ransomware

CHAPTER 22. Analyzing 64-bit Malware

CHAPTER 23. Next-Generation Reverse Engineering