Buch, Englisch, 656 Seiten, Format (B × H): 185 mm x 229 mm, Gewicht: 941 g
Buch, Englisch, 656 Seiten, Format (B × H): 185 mm x 229 mm, Gewicht: 941 g
ISBN: 978-0-07-183238-0
Verlag: McGraw-Hill Education
Autoren/Hrsg.
Weitere Infos & Material
Part I:Law & Ethics1: Ethical Hacking and the Legal SystemPart II: Crash Course: Preparing for the War2 Programming Survival Skill3 Passive Analysis4 Advanced Reverse Engineering with IDA Pro 5 Intelligent Fuzzing 6 Shellcode Strategies7 Writing Linux ShellcodePart III: From Vulnerability to Exploit8: Spoofing Based Attacks9: Exploiting Cisco Routers 10: Basic Linux Exports 11: Advanced Linux Exploits 12: Bypassing Windows Memory Protections 13: Exploiting the Windows Access Control Model 14: Exploiting Web Applications 15: Bypassing Adobe Sandbox 16: Client-Side Browser Exploits17: Exploiting Mobile Devices Part IV: Automated Exploitation18: Advanced Client-side Exploitation with BeEF19: Metasploit to the Next Level20: Commercial Exploit Frameworks AnalysisPart V: Advanced Malware Analysis21: Dissecting Stuxnet22: Dissecting Android Malware23: Dissecting Blackhole Exploit Kit24: Analyzing 64-bit Malware25: Dissecting Kernel-mode Rootkit