Gray Hat Hacking : The Ethical Hacker's Handbook, Sixth Edition /
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , , , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, N.Y. :
McGraw Hill LLC,
[2022]
|
Edición: | Sixth edition. |
Colección: | McGraw-Hill's AccessEngineeringLibrary.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- Acknowledgments
- Introduction
- Part I Preparation
- Chapter 1 Gray Hat Hacking
- Chapter 2 Programming Survival Skills
- Chapter 3 Linux Exploit Development Tools
- Chapter 4 Introduction to Ghidra
- Chapter 5 IDA Pro
- Part II Ethical Hacking
- Chapter 6 Red and Purple Teams
- Chapter 7 Command and Control (C2)
- Chapter 8 Building a Threat Hunting Lab
- Chapter 9 Introduction to Threat Hunting
- Part III Hacking Systems
- Chapter 10 Basic Linux Exploits
- Chapter 11 Advanced Linux Exploits
- Chapter 12 Linux Kernel Exploits
- Chapter 13 Basic Windows Exploitation
- Chapter 14 Windows Kernel Exploitation
- Chapter 15 PowerShell Exploitation
- Chapter 16 Getting Shells Without Exploits
- Chapter 17 Post-Exploitation in Modern Windows Environments
- Chapter 18 Next-Generation Patch Exploitation
- Part IV Hacking IoT
- Chapter 19 Internet of Things to Be Hacked
- Chapter 20 Dissecting Embedded Devices
- Chapter 21 Exploiting Embedded Devices
- Chapter 22 Software-Defined Radio
- Part V Hacking Hypervisors
- Chapter 23 Hypervisors 101
- Chapter 24 Creating a Research Framework
- Chapter 25 Inside Hyper-V
- Chapter 26 Hacking Hypervisors Case Study
- Part VI Hacking the Cloud
- Chapter 27 Hacking in Amazon Web Services
- Chapter 28 Hacking in Azure
- Chapter 29 Hacking Containers
- Chapter 30 Hacking on Kubernetes
- Index.