Топ-100 | Обзор | Комменты | Новости | RSS RSS | Поиск | Хочу! | Добавить ссылки | О сайте | FAQ | Профиль
RapidLinks - Скачай всё!
  


GRay Hat Hacking The Ethical Hacker's Handbook, Fourth Edition - Daniel Regalado

GRay Hat Hacking The Ethical Hacker's Handbook, Fourth Edition - Daniel Regalado



КнигиКниги Рейтинг публикации: 0 (голосов: 0)  
https://i124.fastpic.org/big/2024/1029/09/b68c0453172760b8fefaeee228872009.jpg
pdf | 19.14 MB | English| Isbn: 9780071838504 | Author: Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness | Year: 2015

Description :
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, andcyber law are thoroughly covered in this state-of-the-art resource.

[*]Build and launch spoofing exploits with Ettercap and Evilgrade
[*]Induce error conditions and crash software using fuzzers
[*]Hack Cisco routers, switches, and network hardware
[*]Use advanced reverse engineering to exploit Windows and Linux software
[*]Bypass Windows Access Control and memory protection schemes
[*]Scan for flaws in Web applications using Fiddler and the x5 plugin
[*]Learn the use-after-free technique used in recent zero days
[*]Bypass Web authentication via MySQL type conversion and MD5 injection attacks
[*]Inject your shellcode into a browser's memory using the latest Heap Spray techniques
[*]Hijack Web browsers with Metasploit and the BeEF Injection Framework
[*]Neutralize ransomware before it takes control of your desktop
[*]Dissect Android malware with JEB and DAD decompilers
[*]Find one-day vulnerabilities with binary diffing

Category: Computers, Networking & Telecommunications, Security - Computer Networks

https://ddownload.com/viasncajzf60
  • Добавлено: 29/10/2024
  • Автор: 0dayhome
  • Просмотрено: 3
Ссылки: (для качалок)
Общий размер публикации: 19,14 МБ
Еще Книги: (похожие ссылки)


Написать комментарий