Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
48,40 €*
Versandkostenfrei per Post / DHL
Lieferzeit 2-3 Wochen
Kategorien:
Beschreibung
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.
Following a crash course in C# and some of its advanced features, you'll learn how to:
-Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
-Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
-Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
-Write a .NET decompiler for Mac and Linux
-Parse and read offline registry hives to dump system information
-Automate the security tools Arachni and Metasploit using their MSGPACK RPCs
Streamline and simplify your work day with Gray Hat C# and C#'s extensive repertoire of powerful tools and libraries.
Following a crash course in C# and some of its advanced features, you'll learn how to:
-Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
-Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
-Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
-Write a .NET decompiler for Mac and Linux
-Parse and read offline registry hives to dump system information
-Automate the security tools Arachni and Metasploit using their MSGPACK RPCs
Streamline and simplify your work day with Gray Hat C# and C#'s extensive repertoire of powerful tools and libraries.
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.
Following a crash course in C# and some of its advanced features, you'll learn how to:
-Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
-Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
-Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
-Write a .NET decompiler for Mac and Linux
-Parse and read offline registry hives to dump system information
-Automate the security tools Arachni and Metasploit using their MSGPACK RPCs
Streamline and simplify your work day with Gray Hat C# and C#'s extensive repertoire of powerful tools and libraries.
Following a crash course in C# and some of its advanced features, you'll learn how to:
-Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
-Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
-Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
-Write a .NET decompiler for Mac and Linux
-Parse and read offline registry hives to dump system information
-Automate the security tools Arachni and Metasploit using their MSGPACK RPCs
Streamline and simplify your work day with Gray Hat C# and C#'s extensive repertoire of powerful tools and libraries.
Über den Autor
Brandon Perry
Inhaltsverzeichnis
Chapter 1: C# Crash Course
Chapter 2: Fuzzing and Exploiting XSS and SQL Injection
Chapter 3: Fuzzing SOAP Endpoints
Chapter 4: Writing Connect-Backs, Binds, and Metasploit Payloads
Chapter 5: Automating Nessus
Chapter 6: Automating Nexpose
Chapter 7: Automating OpenVAS
Chapter 8: Automating the Cuckoo Sandbox
Chapter 9: Automating sqlmap
Chapter 10: Automating ClamAV
Chapter 11: Automating Metasploit
Chapter 12: Automating Arachni
Chapter 13: Decompiling and Reversing Managed Assemblies
Chapter 14: Reading Offline Windows NT Registry Hives
Chapter 2: Fuzzing and Exploiting XSS and SQL Injection
Chapter 3: Fuzzing SOAP Endpoints
Chapter 4: Writing Connect-Backs, Binds, and Metasploit Payloads
Chapter 5: Automating Nessus
Chapter 6: Automating Nexpose
Chapter 7: Automating OpenVAS
Chapter 8: Automating the Cuckoo Sandbox
Chapter 9: Automating sqlmap
Chapter 10: Automating ClamAV
Chapter 11: Automating Metasploit
Chapter 12: Automating Arachni
Chapter 13: Decompiling and Reversing Managed Assemblies
Chapter 14: Reading Offline Windows NT Registry Hives
Details
Erscheinungsjahr: | 2017 |
---|---|
Fachbereich: | Programmiersprachen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | 278 S. |
ISBN-13: | 9781593277598 |
ISBN-10: | 1593277598 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Perry, Brandon |
Hersteller: | No Starch Press |
Verantwortliche Person für die EU: | Petersen Buchimport GmbH, Vertrieb, Weidestr. 122a, D-22083 Hamburg, gpsr@petersen-buchimport.com |
Maße: | 233 x 177 x 23 mm |
Von/Mit: | Brandon Perry |
Erscheinungsdatum: | 18.06.2017 |
Gewicht: | 0,596 kg |
Über den Autor
Brandon Perry
Inhaltsverzeichnis
Chapter 1: C# Crash Course
Chapter 2: Fuzzing and Exploiting XSS and SQL Injection
Chapter 3: Fuzzing SOAP Endpoints
Chapter 4: Writing Connect-Backs, Binds, and Metasploit Payloads
Chapter 5: Automating Nessus
Chapter 6: Automating Nexpose
Chapter 7: Automating OpenVAS
Chapter 8: Automating the Cuckoo Sandbox
Chapter 9: Automating sqlmap
Chapter 10: Automating ClamAV
Chapter 11: Automating Metasploit
Chapter 12: Automating Arachni
Chapter 13: Decompiling and Reversing Managed Assemblies
Chapter 14: Reading Offline Windows NT Registry Hives
Chapter 2: Fuzzing and Exploiting XSS and SQL Injection
Chapter 3: Fuzzing SOAP Endpoints
Chapter 4: Writing Connect-Backs, Binds, and Metasploit Payloads
Chapter 5: Automating Nessus
Chapter 6: Automating Nexpose
Chapter 7: Automating OpenVAS
Chapter 8: Automating the Cuckoo Sandbox
Chapter 9: Automating sqlmap
Chapter 10: Automating ClamAV
Chapter 11: Automating Metasploit
Chapter 12: Automating Arachni
Chapter 13: Decompiling and Reversing Managed Assemblies
Chapter 14: Reading Offline Windows NT Registry Hives
Details
Erscheinungsjahr: | 2017 |
---|---|
Fachbereich: | Programmiersprachen |
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | 278 S. |
ISBN-13: | 9781593277598 |
ISBN-10: | 1593277598 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Perry, Brandon |
Hersteller: | No Starch Press |
Verantwortliche Person für die EU: | Petersen Buchimport GmbH, Vertrieb, Weidestr. 122a, D-22083 Hamburg, gpsr@petersen-buchimport.com |
Maße: | 233 x 177 x 23 mm |
Von/Mit: | Brandon Perry |
Erscheinungsdatum: | 18.06.2017 |
Gewicht: | 0,596 kg |
Sicherheitshinweis