Monday 31 July 2017

Gray Hat Hacking Fourth Edition Networking Communication



DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about  Gray Hat Hacking (Networking Communication).

Table of Contents:-


Part I Crash Course: Preparing for the War
Chapter 1 Ethical Hacking and the Legal System 
Chapter 2 Programming Survival Skills 
Chapter 3 Static Analysis
Chapter 4 Advanced Analysis with IDA Pro 
Chapter 5 World of Fuzzing 
Chapter 6 Shellcode Strategies 
Chapter 7 Writing Linux Shellcode
Part II From Vulnerability to Exploit
Chapter 8 Spoofi ng-Based Attacks
Chapter 9 Exploiting Cisco Routers 
Chapter 10 Basic Linux Exploits 
Chapter 11 Advanced Linux Exploits  
Chapter 12 Windows Exploits 
Chapter 13 Bypassing Windows Memory Protections
Chapter 14 Exploiting the Windows Access Control Model 
Cahpter 15 Exploiting Web Applications 
Chapter 16 Exploiting IE: Smashing the Heap 
Chapter 17 Exploiting IE: Use-After-Free Technique 
Chapter 18 Advanced Client-Side Exploitation with BeEF
Chapter 19 One-Day Exploitation with Patch Diffing
Part III Advanced Malware Analysis
Chapter 20 Dissecting Android Malware 
Chapter 21 Dissecting Ransomware 
Chapter 22 Analyzing 64-bit Malware 
Chapter 23 Next-Generation Reverse Engineering 






Harry

Author & Editor

A technology enthusiast and addictive blogger who likes to hacking tricks and wish to be the best White Hacket Hacker of the World.

0 comments:

Post a Comment

Note: only a member of this blog may post a comment.