53,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in über 4 Wochen
payback
27 °P sammeln
  • Broschiertes Buch

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.
Following a crash course in C# and some of its advanced features, you ll learn how to: Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads Automate Nessus, OpenVAS, and sqlmap to
…mehr

Produktbeschreibung
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.

Following a crash course in C# and some of its advanced features, you ll learn how to:
Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
Write a .NET decompiler for Mac and Linux
Parse and read offline registry hives to dump system information
Automate the security tools Arachni and Metasploit using their MSGPACK RPCs

Streamline and simplify your work day with Gray Hat C# and C# s extensive repertoire of powerful tools and libraries.
Autorenporträt
Brandon Perry
Rezensionen
Gray Hat C# is a highly valuable resource that will help you make the most of your SDLC via practical examples. This book will teach you how to integrate with a plethora of widely used and established security tools. Test harder, and ship with confidence.
Tasos Laskos, Creator of Arachni

An immersive read that leaves the reader with an excellent understanding of the potential of C#.
Infosecurity Magazine

Perry's explanations of what the code does are excellent. If you're trying to test projects to see where vulnerabilities lie so you can close down the holes, I highly recommend this title.
I Programmer