logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Black Hat Ruby Offensive Ruby Programming For Hackers And Pentesters Hassanyah

  • SKU: BELL-57814726
Black Hat Ruby Offensive Ruby Programming For Hackers And Pentesters Hassanyah
$ 31.00 $ 45.00 (-31%)

4.3

68 reviews

Black Hat Ruby Offensive Ruby Programming For Hackers And Pentesters Hassanyah instant download after payment.

Publisher: Independently published
File Extension: PDF
File size: 32.74 MB
Pages: 332
Author: Hassanyah, Sabri Saleh
ISBN: 9798687311946, 868731194X
Language: English
Year: 2020

Product desciption

Black Hat Ruby Offensive Ruby Programming For Hackers And Pentesters Hassanyah by Hassanyah, Sabri Saleh 9798687311946, 868731194X instant download after payment.

The primary goal of Black Hat Ruby book is to provide you with a vast angle of using Ruby as an information security professional in an offensive manner. The book meant to help you with weaponizing Ruby language in various offensive scenarios whether you are testing web applications, networks, systems, or exploit development to carve your ideas into working and achieving code. Another intended goal of the book is to route you to the code that achieves your goal in the shortest time. This book is aimed at security researchers, security consultants, penetration testers, red teamers, or any professional who is interested in writing offensive Code. In this book, you will learn:• Hacker's day to day string manipulation, conversion, and extraction.• Compiling ruby to exe, parsing, and files such as XML, JSON, HTML, and binary. • Manipulating files stamps, creating malicious Shortcut, Excel & PDF files. • Generating the most common hashes for various platforms. • Using ruby to execute system commands. • Tactical code for red teaming activities, such as lateral movements via WinRM, WMI and creating malicious OLE and malicious Excel files for spear phishing. • Importing Windows system internal for execute shellcode, dll injection. • Introduction to the network Socket operations in Ruby and creating a remote shell. • Malicious use for network services such as HTTP, SSH, DNS, FTP, TFTP for exploitation and data exfiltration. • Packet manipulation and building network packet from the ground up to for ARP spoofing, rogue wireless access point (AP), SNMP spoofing and parsing captured pcap files. • Introduction about dealing with services and creating covert C2 for data exfiltration. • Automating the hunting of XSS and blind-XSS. • Exploiting Web socket and WSDL services and its APIs. • Using Slack as a C2 • Understanding and creating advanced Burp Suite scanner extensions (active and passive) and manipulate the Burp user interface in detail. • Step by step basic buffer over…

Related Products