|
|
|
|
LEADER |
00000cam a22000008i 4500 |
001 |
OR_ocn971333823 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
170202s2017 cau ob 001 0 eng |
010 |
|
|
|a 2017005221
|
040 |
|
|
|a DLC
|b eng
|e rda
|e pn
|c DLC
|d OCLCF
|d OCLCO
|d UMI
|d IDEBK
|d STF
|d TEFOD
|d OCLCQ
|d TOH
|d OCLCA
|d VT2
|d LIV
|d YDX
|d EBLCP
|d K6U
|d MERUC
|d UAB
|d IDB
|d OCLCQ
|d COO
|d CEF
|d KSU
|d OCLCQ
|d D6H
|d OCLCQ
|d S9I
|d WYU
|d C6I
|d UKAHL
|d OCLCQ
|d OCLCO
|d EYM
|d N$T
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 993443637
|a 1048182101
|a 1078955687
|a 1103277393
|a 1129360944
|
020 |
|
|
|a 9781593278311
|q (electronic bk.)
|
020 |
|
|
|a 1593278314
|q (electronic bk.)
|
020 |
|
|
|z 9781593278328
|
020 |
|
|
|z 1593278322
|
020 |
|
|
|z 9781593277598
|q (pbk.)
|
020 |
|
|
|z 1593277598
|
029 |
1 |
|
|a AU@
|b 000067107975
|
029 |
1 |
|
|a CHNEW
|b 001002229
|
029 |
1 |
|
|a CHVBK
|b 515200344
|
029 |
1 |
|
|a GBVCP
|b 1004861303
|
029 |
1 |
|
|a AU@
|b 000062874191
|
035 |
|
|
|a (OCoLC)971333823
|z (OCoLC)993443637
|z (OCoLC)1048182101
|z (OCoLC)1078955687
|z (OCoLC)1103277393
|z (OCoLC)1129360944
|
037 |
|
|
|a CL0500000872
|b Safari Books Online
|
037 |
|
|
|a F075BCDE-3994-42AB-8976-8CF69C27FD21
|b OverDrive, Inc.
|n http://www.overdrive.com
|
042 |
|
|
|a pcc
|
050 |
1 |
0 |
|a QA76.73.C154
|
082 |
0 |
0 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Perry, Brandon,
|e author.
|
245 |
1 |
0 |
|a Gray hat C# :
|b a hacker's guide to creating and automating security tools /
|c Brandon Perry.
|
263 |
|
|
|a 1706
|
264 |
|
1 |
|a San Francisco :
|b No Starch Press, Inc.,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b n
|2 rdamedia
|
338 |
|
|
|a online resource
|b nc
|2 rdacarrier
|
347 |
|
|
|a data file
|
520 |
|
|
|a "Teaches how to use C#'s set of core libraries to automate tasks like performing vulnerability scans, malware analysis, and incident response. Teaches how to write practical security tools that will run on Mac, Linux, and mobile devices"--
|c Provided by publisher
|
588 |
0 |
|
|a Print version record and CIP data provided by publisher; resource not viewed.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Intro; Brief Contents; Contents in Detail; Foreword; Preface; Why Should I Trust Mono?; Who Is This Book For?; Organization of This Book; Acknowledgements; A Final Note; Chapter 1: C# Crash Course; Choosing an IDE; A Simple Example; Introducing Classes and Interfaces; Creating a Class; Creating an Interface; Subclassing from an Abstract Class and Implementing an Interface; Tying Everything Together with the Main() Method; Running the Main() Method; Anonymous Methods; Assigning a Delegate to a Method; Updating the Firefighter Class; Creating Optional Arguments; Updating the Main() Method.
|
505 |
8 |
|
|a Running the Updated Main() MethodIntegrating with Native Libraries; Conclusion; Chapter 2: Fuzzing and Exploiting XSS and SQL Injection; Setting Up the Virtual Machine; Adding a Host-Only Virtual Network; Creating the Virtual Machine; Booting the Virtual Machine from the BadStore ISO; SQL Injections; Cross-Site Scripting; Fuzzing GET Requests with a Mutational Fuzzer; Tainting the Parameters and Testing for Vulnerabilities; Building the HTTP Requests; Testing the Fuzzing Code; Fuzzing POST Requests; Writing a POST Request Fuzzer; The Fuzzing Begins; Fuzzing Parameters; Fuzzing JSON.
|
505 |
8 |
|
|a Setting Up the Vulnerable ApplianceCapturing a Vulnerable JSON Request; Creating the JSON Fuzzer; Testing the JSON Fuzzer; Exploiting SQL Injections; Performing a UNION-Based Exploit by Hand; Performing a UNION-Based Exploit Programmatically; Exploiting Boolean-Blind SQL Vulnerabilities; Conclusion; Chapter 3: Fuzzing SOAP Endpoints; Setting Up the Vulnerable Endpoint; Parsing the WSDL; The WSDL Class Constructor; Writing the Initial Parsing Methods; Writing a Class for the SOAP Type and Parameters; Creating the SoapMessage Class to Define Sent Data; Implementing a Class for Message Parts.
|
505 |
8 |
|
|a Defining Port Operations with the SoapPortType ClassImplementing a Class for Port Operations; Defining Protocols Used in SOAP Bindings; Compiling a List of Operation Child Nodes; Finding the SOAP Services on Ports; Automatically Fuzzing the SOAP Endpoint for SQL Injection Vulnerabilities; Fuzzing Individual SOAP Services; Fuzzing the HTTP POST SOAP Port; Fuzzing the SOAP XML Port; Running the Fuzzer; Conclusion; Chapter 4: Writing Connect-Back, Binding, and Metasploit Payloads; Creating a Connect-Back Payload; The Network Stream; Running the Command; Running the Payload; Binding a Payload.
|
505 |
8 |
|
|a Accepting Data, Running Commands, and Returning OutputExecuting Commands from the Stream; Using UDP to Attack a Network; The Code for the Target's Machine; The Attacker's Code; Running x86 and x86-64 Metasploit Payloads from C#; Setting Up Metasploit; Generating Payloads; Executing Native Windows Payloads as Unmanaged Code; Executing Native Linux Payloads; Conclusion; Chapter 5: Automating Nessus; REST and the Nessus API; The NessusSession Class; Making the HTTP Requests; Logging Out and Cleaning Up; Testing the NessusSession Class; The NessusManager Class; Performing a Nessus Scan.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a C# (Computer program language)
|
650 |
|
0 |
|a Automatic control
|x Computer programs.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a C# (Langage de programmation)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Automatic control
|x Computer programs
|2 fast
|
650 |
|
7 |
|a C# (Computer program language)
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Perry, Brandon.
|t Gray hat C#.
|d San Francisco : No Starch Press, Inc., [2017]
|z 9781593277598
|w (DLC) 2017002556
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781492023449/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32360765
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6054163
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis37554660
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15256501
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1571343
|
994 |
|
|
|a 92
|b IZTAP
|