A Hacker’s Guide to Creating and Automating Security Tools: Gray Hat C#
49.99 JOD
Please allow 2 – 5 weeks for delivery of this item
Add to Gift RegistryDescription
Learn to use C#’s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.Following a crash course in C# and some of its advanced features, you’ll learn how to:–Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection–Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads–Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections–Write a .NET decompiler for Mac and Linux–Parse and read offline registry hives to dump system information–Automate the security tools Arachni and Metasploit using their MSGPACK RPCsStreamline and simplify your work day with Gray Hat C# and C#’s extensive repertoire of powerful tools and libraries.
Additional information
| Weight | 0.5902 kg |
|---|---|
| Dimensions | 1.8796 × 17.78 × 23.495 cm |
| Author(s) | |
| Format Old` | |
| Language | |
| Publisher | |
| Year Published | 2017-5-15 |
| Imprint | |
| Publication City/Country | USA |
| ISBN 10 | 1593277598 |
| About The Author | Brandon Perry is the co-author of Wicked Cool Shell Scripts, 2nd Edition (No Starch Press). He started writing C# applications with the advent of the open source .NET implementation called Mono. In his free time, he enjoys writing modules for the Metasploit framework, parsing binary files, and fuzzing things. |
“Gray Hat C# is a highly valuable resource that will help you make the most of your SDLC via practical examples. This book will teach you how to integrate with a plethora of widely used and established security tools. Test harder, and ship with confidence.”—Tasos Laskos, Creator of Arachni“An immersive read that leaves the reader with an excellent understanding of the potential of C#.”—Infosecurity Magazine“Perry's explanations of what the code does are excellent. If you're trying to test projects to see where vulnerabilities lie so you can close down the holes, I highly recommend this title.”—I Programmer |
|
| Table Of Content | Chapter 1: C# Crash CourseChapter 2: Fuzzing and Exploiting XSS and SQL InjectionChapter 3: Fuzzing SOAP EndpointsChapter 4: Writing Connect-Backs, Binds, and Metasploit PayloadsChapter 5: Automating NessusChapter 6: Automating NexposeChapter 7: Automating OpenVASChapter 8: Automating the Cuckoo SandboxChapter 9: Automating sqlmapChapter 10: Automating ClamAVChapter 11: Automating MetasploitChapter 12: Automating ArachniChapter 13: Decompiling and Reversing Managed AssembliesChapter 14: Reading Offline Windows NT Registry Hives |
Only logged in customers who have purchased this product may leave a review.





Reviews
There are no reviews yet.