CITATION

Harper, Allen; Linn, Ryan; Sims, Stephen; Baucom, Michael; Tejeda, Huascar; Fernandez, Daniel; and Frost, Moses. Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition. New York: McGraw Hill LLC, 2022.

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

Published:  March 2022 Pages: 752

eISBN: 9781264268955 | ISBN: 9781264268948
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • Contents
  • Preface
  • Acknowledgments
  • Introduction
  • Part I Preparation
  • Chapter 1 Gray Hat Hacking
  • Chapter 2 Programming Survival Skills
  • Chapter 3 Linux Exploit Development Tools
  • Chapter 4 Introduction to Ghidra
  • Chapter 5 IDA Pro
  • Part II Ethical Hacking
  • Chapter 6 Red and Purple Teams
  • Chapter 7 Command and Control (C2)
  • Chapter 8 Building a Threat Hunting Lab
  • Chapter 9 Introduction to Threat Hunting
  • Part III Hacking Systems
  • Chapter 10 Basic Linux Exploits
  • Chapter 11 Advanced Linux Exploits
  • Chapter 12 Linux Kernel Exploits
  • Chapter 13 Basic Windows Exploitation
  • Chapter 14 Windows Kernel Exploitation
  • Chapter 15 PowerShell Exploitation
  • Chapter 16 Getting Shells Without Exploits
  • Chapter 17 Post-Exploitation in Modern Windows Environments
  • Chapter 18 Next-Generation Patch Exploitation
  • Part IV Hacking IoT
  • Chapter 19 Internet of Things to Be Hacked
  • Chapter 20 Dissecting Embedded Devices
  • Chapter 21 Exploiting Embedded Devices
  • Chapter 22 Software-Defined Radio
  • Part V Hacking Hypervisors
  • Chapter 23 Hypervisors 101
  • Chapter 24 Creating a Research Framework
  • Chapter 25 Inside Hyper-V
  • Chapter 26 Hacking Hypervisors Case Study
  • Part VI Hacking the Cloud
  • Chapter 27 Hacking in Amazon Web Services
  • Chapter 28 Hacking in Azure
  • Chapter 29 Hacking Containers
  • Chapter 30 Hacking on Kubernetes
  • Index