Gray Hat C#

Gray Hat C#
Creating and Automating Security Tools
Brandon Perry
June 2017, 272 pp.

Order now and get early access to the PDF ebook!
(What's Early Access?)
(Which chapters are available now?)

Get 30% off with the coupon code EARLYBIRD

Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.

Following a crash course in C# and some of its advanced features, you’ll learn how to:

  • Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injection
  • Generate shellcode in Metasploit to create cross-platform and cross-architecture payloads
  • Automate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injections
  • Write a .NET decompiler for Mac and Linux
  • Parse and read offline registry hives to dump system information
  • Automate the security tools Arachni and Metasploit using their MSGPACK RPCs

Streamline and simplify your work day with Gray Hat C# and C#’s extensive repertoire of powerful tools and libraries.

Author Bio 

Brandon Perry is the co-author of Wicked Cool Shell Scripts, 2nd Edition (No Starch Press). He started writing C# applications with the advent of the open source .NET implementation called Mono. In his free time, he enjoys writing modules for the Metasploit framework, parsing binary files, and fuzzing things.

Table of contents 

Chapter 1: C# Crash Course (AVAILABLE NOW)
Chapter 2: Fuzzing and Exploiting XSS and SQL Injection (AVAILABLE NOW)
Chapter 3: Fuzzing SOAP Endpoints (AVAILABLE NOW)
Chapter 4: Writing Connect-Backs, Binds, and Metasploit Payloads (AVAILABLE NOW)
Chapter 5: Automating Nessus (AVAILABLE NOW)
Chapter 6: Automating Nexpose (AVAILABLE NOW)
Chapter 7: Automating OpenVAS (AVAILABLE NOW)
Chapter 8: Automating the Cuckoo Sandbox (AVAILABLE NOW)
Chapter 9: Automating sqlmap (AVAILABLE NOW)
Chapter 10: Automating ClamAV (AVAILABLE NOW)
Chapter 11: Automating Metasploit (AVAILABLE NOW)
Chapter 12: Automating Arachni (AVAILABLE NOW)
Chapter 13: Decompiling and Reversing Managed Assemblies (AVAILABLE NOW)
Chapter 14: Reading Offline Windows NT Registry Hives (AVAILABLE NOW)