AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

par Brandon Perry

MembresCritiquesPopularitéÉvaluation moyenneDiscussions
281840,991 (3)Aucun
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices. After a crash course in C# and some of its advanced features, you'll learn how to: Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injections Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections Write a .NET decompiler for OS X and Linux Parse and read offline registry hives to dump system information Automate the security tools Arachni and Metasploit using their MSGPACK RPCs Streamline and simplify your workday by making the most of C#'s extensive repertoire of powerful tools and libraries with Gray Hat C# .… (plus d'informations)
Aucun
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

Odd book. Not quite what I expected. If you're looking for a reference on how to tie one of the various mentioned tools into a C# project yourself, it will have a potentially useful starter at least. Other than that, the specific sections could use a bit more fleshing out to be useful alone and all together, it's an odd combination.

Structurewise, the first section of the book was odd. Basically a tutorial of C#, but only a limited subset of functionality, chosen oddly. Then a number of web related things. Sure. Weird, but fair enough. Then we have SQL injections and XSS, which are discussed in more depth other places. Yes, this book ties them to C#, but it's string processing. Nothing super specific to any particular language there.

After that, we have about half the book dedicated to several specific tools. They either had C# APIs or one would have to either call to a REST API or make native calls. All of these are interesting, but they don't actually get into details on how to use a specific tool, rather setting up using it with C# / .NET. But this all feels like it should have just been wrapped in a library, so that the user doesn't necessarily need the details. So it goes.

One we get to Chapter 13 though, that's a bit more interesting (and more relevant to C#) since it talks about decompiling. It's really only a tool reference though, although a pure code disassembler when you aren't on Windows is handy.

Then we're back to a weird feeling chapter on registry keys. Interesting, but not too deep.

I think (unfortunately), the most memorable thing about this book was the ❶ ❷ ❸ ❹ ❺ numbered circles. I guess so far as ways to refer to the code in a book (rather than a website with on hover text), it works. It's just very distracting.

Perhaps not the best book for a someone interested in security, but it did serve to remind me how much I liked .NET and C# when I last used them. I should dust off those projects at some point. So yay for that! ( )
  jpv0 | Jul 21, 2021 |
aucune critique | ajouter une critique
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Lieux importants
Évènements importants
Films connexes
Épigraphe
Dédicace
Premiers mots
Citations
Derniers mots
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Langue d'origine
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais

Aucun

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like fuzzing, performing vulnerability scans, and analyzing malware. With some help from Mono, you'll write your own practical security tools that will run on Windows, OS X, Linux, and even mobile devices. After a crash course in C# and some of its advanced features, you'll learn how to: Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injections Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections Write a .NET decompiler for OS X and Linux Parse and read offline registry hives to dump system information Automate the security tools Arachni and Metasploit using their MSGPACK RPCs Streamline and simplify your workday by making the most of C#'s extensive repertoire of powerful tools and libraries with Gray Hat C# .

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: (3)
0.5
1
1.5
2
2.5
3 1
3.5
4
4.5
5

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 205,455,854 livres! | Barre supérieure: Toujours visible