September 2021
Intermediate to advanced
376 pages
9h 25m
English
Chapter 2: Capturing Traffic with ARP Spoofing
Chapter 3: Analyzing Captured Traffic
Chapter 4: Crafting TCP Shells and Botnets
Chapter 5: Cryptography and Ransomware
Chapter 6: TLS and Diffie-Hellman
Chapter 7: Phishing and Deepfakes
Chapter 9: Fuzzing for Zero-Day Vulnerabilities
Chapter 11: Building and Installing Linux Rootkits
Chapter 12: Stealing and Cracking Passwords
Chapter 13: Serious Cross-Site Scripting Exploitation
PART V: CONTROLLING THE NETWORK