DISCLAIMER: Following data/info/files are not owned/made/uploaded by latesttrickes On our last article about a lot of people asked about Gray Hat Hacking (Networking Communication). Table of Contents:- Part I Crash Course: Preparing for the War Chapter 1 Ethical Hacking and the Legal System Chapter 2 Programming Survival Skills Chapter 3 Static Analysis Chapter 4 Advanced Analysis with IDA Pro Chapter 5 World of Fuzzing Chapter 6 Shellcode Strategies Chapter 7 Writing Linux Shellcode Part II From Vulnerability to Exploit Chapter 8 Spoofi ng-Based Attacks Chapter 9 Exploiting Cisco Routers Chapter 10 Basic Linux Exploits Chapter 11 Advanced Linux Exploits Chapter 12 Windows Exploits Chapter 13 Bypassing Windows Memory Protections Chapter 14 Exploiting the Windows Access Control Model Cahpter 15 Exploiting Web Applications Chapter 16 Exploiting IE: Smashing the Heap Chapter 17 Exploiting IE: Use-After-Free Technique Chapter