DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Gray Hat Hacking (Networking Communication).
Table of Contents:-
Part I Crash Course: Preparing for the War
Chapter 1 Ethical Hacking and the Legal System
Chapter 2 Programming Survival Skills
Chapter 3 Static Analysis
Chapter 4 Advanced Analysis with IDA Pro
Chapter 5 World of Fuzzing
Chapter 6 Shellcode Strategies
Chapter 7 Writing Linux Shellcode
Part II From Vulnerability to Exploit
Chapter 8 Spoofi ng-Based Attacks
Chapter 9 Exploiting Cisco Routers
Chapter 10 Basic Linux Exploits
Chapter 11 Advanced Linux Exploits
Chapter 12 Windows Exploits
Chapter 13 Bypassing Windows Memory Protections
Chapter 14 Exploiting the Windows Access Control Model
Cahpter 15 Exploiting Web Applications
Chapter 16 Exploiting IE: Smashing the Heap
Chapter 17 Exploiting IE: Use-After-Free Technique
Chapter 18 Advanced Client-Side Exploitation with BeEF
Chapter 19 One-Day Exploitation with Patch Diffing
Part III Advanced Malware Analysis
Chapter 20 Dissecting Android Malware
Chapter 21 Dissecting Ransomware
Chapter 22 Analyzing 64-bit Malware
Chapter 23 Next-Generation Reverse Engineering
0 comments:
Post a Comment
Note: only a member of this blog may post a comment.