Gray Hat Hacking: The Ethical Hacker's Handbook, 6th Edition PDF

Gray Hat Hacking: The Ethical Hacker's Handbook, 6th Edition PDF

Name:
Gray Hat Hacking: The Ethical Hacker's Handbook, 6th Edition PDF

Published Date:
01/01/2022

Status:
[ Active ]

Description:

Publisher:
McGraw-Hill Publishing Company

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$18
Need Help?
ISBN: 9781264268948

Discover critical security flaws and fortify your IT framework using the proven security techniques and best practices contained in this authoritative guide. Completely updated to align with the current threat landscape, Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition explains the enemy's weapons, skills, and tactics and offers field-tested remedies, case studies, and testing labs. Inside, you'll find out how cybercriminals gain access, hijack devices and software, inject malicious code, steal mission-critical data, and plunder entire networks. Internet of Things, hypervisors, and cloud security are thoroughly covered in this state-of-the-art resource.

Discover how to:

• Develop and deploy custom scripts that locate security holes

• Work with dynamic information-gathering tools

• Employ pwntools' capture the flag (CTF) and exploit development library

• Reverse-engineer software using Ghidra and IDA Pro

• Understand command and control (C2) and evasion techniques

• Assemble red and purple teams and start ethically hacking

• Build an effective threat hunting lab and search for network invaders

• Target Linux vulnerabilities using both basic and advanced techniques

• Exploit Windows systems, applications, and the Windows kernel

• Perform post-exploitation recon, privilege escalation, and Active Directory persistence

• Identify vulnerabilities using application and patch diffing

• Hack Internet of Things (IoT) and embedded devices

• Attack hypervisors and Kubernetes systems

• Exploit wireless systems with software-defined radios (SDRs)

• Hack cloud infrastructures, including Amazon Web Services (AWS)

Author: Dr. Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost


Edition : 6.
Published : 01/01/2022
isbn : 9781264268948

History


Related products


Best-Selling Products

TELCORDIA FR-RTP-1-CD-21-100USERS
Published Date: 02/01/2003
Release to Pivot (RTP) Family of Requirements (RTPFR), FR-RTP-1
TELCORDIA FR-SONET-17-CD-1USER
Published Date: 02/01/2003
Broadband and Transport Network Generic Requirements: SONET and ATM Transport Technologies
TELCORDIA FR-SONET-17-CD-6-20USER
Published Date: 02/01/2003
Broadband and Transport Network Generic Requirements: SONET and ATM Transport Technologies
TELCORDIA GR-1009
Published Date: 11/01/1994
Generic Requirements for Fiber Optic Clip-on Test Sets
TELCORDIA GR-1031
Published Date: 10/01/1997
OTGR Section 15.6: Operations Interfaces Using OSI Tools: Test Access Management
TELCORDIA GR-1042
Published Date: 12/01/1998
Generic Requirements for Operations Interfaces Using OSI Tools - Information Model Overview: Synchronous Optical Network (SONET) Transport Information Model