Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 532
- Application software 520
- Engineering & Applied Sciences 276
- Computer Science 239
- Programming 184
- Computer programming 170
- Web site development 164
- Computer programs 142
- Python (Computer program language) 136
- Java (Computer program language) 126
- JavaScript (Computer program language) 121
- Computer software 120
- Microsoft .NET Framework 114
- Design 110
- Operating systems (Computers) 106
- Web sites 101
- Internet programming 96
- Cloud computing 89
- Linux 81
- Web applications 81
- Android (Electronic resource) 78
- Programming languages (Electronic computers) 77
- Debugging in computer science 76
- Open source software 76
- Computer networks 74
- Software engineering 74
- Mobile computing 72
- Database management 69
- iOS (Electronic resource) 69
- Management 67
-
421
-
422
-
423
-
424
-
425
-
426
-
427
-
428Publicado 2018Tabla de Contenidos: “…Data injection with the hash length extension attack -- Busting the padding oracle with PadBuster -- Interrogating the padding oracle -- Decrypting a CBC block with PadBuster -- Behind the scenes of the oracle padding attack -- Summary -- Questions -- Further reading -- Chapter 6: Advanced Exploitation with Metasploit -- Technical requirements -- How to get it right the first time - generating payloads -- Installing Wine32 and Shellter -- Payload generation goes solo - working with msfvenom -- Creating nested payloads -- Helter Skelter evading antivirus with Shellter -- Modules - the bread and butter of Metasploit -- Building a simple Metasploit auxiliary module -- Efficiency and attack organization with Armitage -- Getting familiar with your Armitage environment -- Enumeration with Armitage -- Exploitation made ridiculously simple with Armitage -- A word about Armitage and the pen tester mentality -- Social engineering attacks with Metasploit payloads -- Creating a Trojan with Shellter -- Preparing a malicious USB drive for Trojan delivery -- Summary -- Questions -- Further reading -- Chapter 7: Stack and Heap Memory Management -- Technical requirements -- An introduction to debugging -- Understanding the stack -- Understanding registers -- Assembly language basics -- Disassemblers, debuggers, and decompilers - oh my! …”
Libro electrónico -
429
-
430
-
431Publicado 2007“…Practical scenarios demonstrate how to apply the tools to monitor, manage, debug, and analyze applications in a real-world environment…”
Libro electrónico -
432
-
433
-
434
-
435
-
436
-
437
-
438
-
439
-
440