Cargando…

Gray hat C# : a hacker's guide to creating and automating security tools /

"Teaches how to use C#'s set of core libraries to automate tasks like performing vulnerability scans, malware analysis, and incident response. Teaches how to write practical security tools that will run on Mac, Linux, and mobile devices"--

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Perry, Brandon (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco : No Starch Press, Inc., [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000008i 4500
001 OR_ocn971333823
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 170202s2017 cau ob 001 0 eng
010 |a  2017005221 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCF  |d OCLCO  |d UMI  |d IDEBK  |d STF  |d TEFOD  |d OCLCQ  |d TOH  |d OCLCA  |d VT2  |d LIV  |d YDX  |d EBLCP  |d K6U  |d MERUC  |d UAB  |d IDB  |d OCLCQ  |d COO  |d CEF  |d KSU  |d OCLCQ  |d D6H  |d OCLCQ  |d S9I  |d WYU  |d C6I  |d UKAHL  |d OCLCQ  |d OCLCO  |d EYM  |d N$T  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 993443637  |a 1048182101  |a 1078955687  |a 1103277393  |a 1129360944 
020 |a 9781593278311  |q (electronic bk.) 
020 |a 1593278314  |q (electronic bk.) 
020 |z 9781593278328 
020 |z 1593278322 
020 |z 9781593277598  |q (pbk.) 
020 |z 1593277598 
029 1 |a AU@  |b 000067107975 
029 1 |a CHNEW  |b 001002229 
029 1 |a CHVBK  |b 515200344 
029 1 |a GBVCP  |b 1004861303 
029 1 |a AU@  |b 000062874191 
035 |a (OCoLC)971333823  |z (OCoLC)993443637  |z (OCoLC)1048182101  |z (OCoLC)1078955687  |z (OCoLC)1103277393  |z (OCoLC)1129360944 
037 |a CL0500000872  |b Safari Books Online 
037 |a F075BCDE-3994-42AB-8976-8CF69C27FD21  |b OverDrive, Inc.  |n http://www.overdrive.com 
042 |a pcc 
050 1 0 |a QA76.73.C154 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Perry, Brandon,  |e author. 
245 1 0 |a Gray hat C# :  |b a hacker's guide to creating and automating security tools /  |c Brandon Perry. 
263 |a 1706 
264 1 |a San Francisco :  |b No Starch Press, Inc.,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b n  |2 rdamedia 
338 |a online resource  |b nc  |2 rdacarrier 
347 |a data file 
520 |a "Teaches how to use C#'s set of core libraries to automate tasks like performing vulnerability scans, malware analysis, and incident response. Teaches how to write practical security tools that will run on Mac, Linux, and mobile devices"--  |c Provided by publisher 
588 0 |a Print version record and CIP data provided by publisher; resource not viewed. 
504 |a Includes bibliographical references and index. 
505 0 |a Intro; Brief Contents; Contents in Detail; Foreword; Preface; Why Should I Trust Mono?; Who Is This Book For?; Organization of This Book; Acknowledgements; A Final Note; Chapter 1: C# Crash Course; Choosing an IDE; A Simple Example; Introducing Classes and Interfaces; Creating a Class; Creating an Interface; Subclassing from an Abstract Class and Implementing an Interface; Tying Everything Together with the Main() Method; Running the Main() Method; Anonymous Methods; Assigning a Delegate to a Method; Updating the Firefighter Class; Creating Optional Arguments; Updating the Main() Method. 
505 8 |a Running the Updated Main() MethodIntegrating with Native Libraries; Conclusion; Chapter 2: Fuzzing and Exploiting XSS and SQL Injection; Setting Up the Virtual Machine; Adding a Host-Only Virtual Network; Creating the Virtual Machine; Booting the Virtual Machine from the BadStore ISO; SQL Injections; Cross-Site Scripting; Fuzzing GET Requests with a Mutational Fuzzer; Tainting the Parameters and Testing for Vulnerabilities; Building the HTTP Requests; Testing the Fuzzing Code; Fuzzing POST Requests; Writing a POST Request Fuzzer; The Fuzzing Begins; Fuzzing Parameters; Fuzzing JSON. 
505 8 |a Setting Up the Vulnerable ApplianceCapturing a Vulnerable JSON Request; Creating the JSON Fuzzer; Testing the JSON Fuzzer; Exploiting SQL Injections; Performing a UNION-Based Exploit by Hand; Performing a UNION-Based Exploit Programmatically; Exploiting Boolean-Blind SQL Vulnerabilities; Conclusion; Chapter 3: Fuzzing SOAP Endpoints; Setting Up the Vulnerable Endpoint; Parsing the WSDL; The WSDL Class Constructor; Writing the Initial Parsing Methods; Writing a Class for the SOAP Type and Parameters; Creating the SoapMessage Class to Define Sent Data; Implementing a Class for Message Parts. 
505 8 |a Defining Port Operations with the SoapPortType ClassImplementing a Class for Port Operations; Defining Protocols Used in SOAP Bindings; Compiling a List of Operation Child Nodes; Finding the SOAP Services on Ports; Automatically Fuzzing the SOAP Endpoint for SQL Injection Vulnerabilities; Fuzzing Individual SOAP Services; Fuzzing the HTTP POST SOAP Port; Fuzzing the SOAP XML Port; Running the Fuzzer; Conclusion; Chapter 4: Writing Connect-Back, Binding, and Metasploit Payloads; Creating a Connect-Back Payload; The Network Stream; Running the Command; Running the Payload; Binding a Payload. 
505 8 |a Accepting Data, Running Commands, and Returning OutputExecuting Commands from the Stream; Using UDP to Attack a Network; The Code for the Target's Machine; The Attacker's Code; Running x86 and x86-64 Metasploit Payloads from C#; Setting Up Metasploit; Generating Payloads; Executing Native Windows Payloads as Unmanaged Code; Executing Native Linux Payloads; Conclusion; Chapter 5: Automating Nessus; REST and the Nessus API; The NessusSession Class; Making the HTTP Requests; Logging Out and Cleaning Up; Testing the NessusSession Class; The NessusManager Class; Performing a Nessus Scan. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a C# (Computer program language) 
650 0 |a Automatic control  |x Computer programs. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a C# (Langage de programmation) 
650 6 |a Sécurité informatique. 
650 7 |a Automatic control  |x Computer programs  |2 fast 
650 7 |a C# (Computer program language)  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Print version:  |a Perry, Brandon.  |t Gray hat C#.  |d San Francisco : No Starch Press, Inc., [2017]  |z 9781593277598  |w (DLC) 2017002556 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781492023449/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32360765 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6054163 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37554660 
938 |a YBP Library Services  |b YANK  |n 15256501 
938 |a EBSCOhost  |b EBSC  |n 1571343 
994 |a 92  |b IZTAP