Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

by Brandon Perry
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

by Brandon Perry

eBook

$23.99 

Available on Compatible NOOK Devices and the free NOOK Apps.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.

Following a crash course in C# and some of its advanced features, you’ll learn how to:
-Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
-Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
-Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
-Write a .NET decompiler for Mac and Linux
-Parse and read offline registry hives to dump system information
-Automate the security tools Arachni and Metasploit using their MSGPACK RPCs

Streamline and simplify your work day with Gray Hat C# and C#’s extensive repertoire of powerful tools and libraries.

Product Details

ISBN-13: 9781593278311
Publisher: No Starch Press
Publication date: 05/15/2017
Sold by: Penguin Random House Publisher Services
Format: eBook
Pages: 304
File size: 19 MB
Note: This product may take a few minutes to download.

About the Author

Brandon Perry is the co-author of Wicked Cool Shell Scripts, 2nd Edition (No Starch Press). He started writing C# applications with the advent of the open source .NET implementation called Mono. In his free time, he enjoys writing modules for the Metasploit framework, parsing binary files, and fuzzing things.

Table of Contents

Chapter 1: C# Crash Course
Chapter 2: Fuzzing and Exploiting XSS and SQL Injection
Chapter 3: Fuzzing SOAP Endpoints
Chapter 4: Writing Connect-Backs, Binds, and Metasploit Payloads
Chapter 5: Automating Nessus
Chapter 6: Automating Nexpose
Chapter 7: Automating OpenVAS
Chapter 8: Automating the Cuckoo Sandbox
Chapter 9: Automating sqlmap
Chapter 10: Automating ClamAV
Chapter 11: Automating Metasploit
Chapter 12: Automating Arachni
Chapter 13: Decompiling and Reversing Managed Assemblies
Chapter 14: Reading Offline Windows NT Registry Hives
From the B&N Reads Blog

Customer Reviews