Skip to content

Notes Contents
Gray Hat Hacking - The Ethical Hacker's Handbook, Sixth Edition.pdf

Chapters

Introduction

Gray Hat Hacking - The Ethical Hacker's Handbook Introduction

Part I: Preparation

Chapter 1 - Gray Hat Hacking
[[Chapter 2 - Programming Survival Skills]]
[[Chapter 3 - Linux Exploit Development Tools]]
[[Chapter 4 - Introduction To Ghidra]]
[[Chapter 5 - IDA Pro]]

Part II: Ethical Hacking

[[Chapter 6 - Red and Purple Teams]]
[[Chapter 7 - Command and Control (C2)]]
[[Chapter 8 - Building a Threat Hunting Lab]]
[[Chapter 9 - Introduction To Threat Hunting]]

Part III: Hacking Systems

[[Chapter 10 - Basic Linux Exploits]]
[[Chapter 11 - Advanced Linux Exploits]]
[[Chapter 12 - Linux Kernel Exploits]]
[[Chapter 13 - Basic Windows Exploitation]]
[[Chapter 14 - Windows Kernel Exploitation]]
[[Chapter 15 - PowerShell Exploitation]]
[[Chapter 16 - Getting Shells Without Exploits]]
[[Chapter 17 - Post-Exploitation In Modern Windows Environments]]
[[Chapter 18 - Next-Generation Patch Exploitation]]

Part IV: Hacking IoT

[[Chapter 19 - Internet Of Things To Be Hacked]]
[[Chapter 20 - Dissecting Embedded Devices]]
[[Chapter 21 - Exploiting Embedded Devices]]
[[Chapter 22 - Software-Defined Radio]]

Part V: Hacking Hypervisors

[[Chapter 23 - Hypervisors 101]]
[[Chapter 24 - Creating a Research Framework]]
[[Chapter 25 - Inside Hyper-V]]
[[Chapter 26 - Hacking Hypervisors Case Study]]

Part VI: Hacking The Cloud

[[Chapter 27 - Hacking In Amazon Web Services]]
[[Chapter 28 - Hacking In Azure]]
[[Chapter 29 - Hacking Containers]]
[[Chapter 30 - Hacking On Kubernetes]]