Gray hat hacking : the ethical hacker's handbook
(2022)

Nonfiction

Book

Call Numbers:
005.8/HARPER,A

Availability

Locations Call Number Status
Adult Nonfiction 005.8/HARPER,A Available

Details

PUBLISHED
New York [N.Y.] : McGraw-Hill, [2022]
EDITION
Sixth edition
DESCRIPTION

xxxiii, 670 pages : illustrations ; 23 cm

ISBN/ISSN
9781264268948, 1264268947, 9781264268948
LANGUAGE
English
NOTES

PPart I: Preparation -- 1. Gray Hat Hacking -- 2. Programming Survival Skills -- 3. Linux Exploit Development Tools -- 4. Introduction to Ghidra -- 5. IDA Pro -- Part II: Ethical Hacking -- 6. Red and Purple Teams -- 7. Command and Control (C2) -- 8. Building a Threat Hunting Lab -- 9. Introduction to Threat Hunting -- Part III: Hacking Systems -- 10. Basic Linux Exploits -- 11. Advanced Linux Exploits -- 12. Linux Kernel Exploits -- 13. Basic Windows Exploitation -- 14. Basic Windows Exploitation -- 15. PowerShell Exploitation -- 16. Getting Shells Without Exploits -- 17. Post-Exploitation in Modern Windows Environments -- 18. Next-Generation Patch Exploitation -- Part IV: Hacking IoT -- 19. Internet of Things to Be Hacked -- 20. Dissecting Embedded Devices -- 21. Exploiting Embedded Device -- 22. Software-Defined Radio -- 23. Hypervisors -- 24. Creating a Research Framework -- 25. Inside Hyper-V -- 26. Hacking Hypervisors Case Study -- 27. Hacking in Amazon Web Services -- 28. Hacking in Azure -- 29. Hacking Containers -- 30. Hacking on Kubernetes

Up-to-date strategies for thwarting the latest, most insidious network attacks This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition clearly explains the enemy's devious weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. You will get complete coverage of Internet of Things, mobile, and Cloud security along with penetration testing, malware analysis, and reverse engineering techniques. State-of-the-art malware, ransomware, and system exploits are thoroughly explained. Fully revised content includes 7 new chapters covering the latest threats Includes proof-of-concept code stored on the GitHub repository Authors train attendees at major security conferences, including RSA, Black Hat, Defcon, and Besides

Additional Credits