Black Hat Go: Go Programming For Hackers and Pentesters
Chris Patten
Sold by THE SAINT BOOKSTORE, Southport, United Kingdom
AbeBooks Seller since 14 June 2006
New - Soft cover
Condition: New
Quantity: 1 available
Add to basketSold by THE SAINT BOOKSTORE, Southport, United Kingdom
AbeBooks Seller since 14 June 2006
Condition: New
Quantity: 1 available
Add to basketNew copy - Usually dispatched within 4 working days. 790.
Seller Inventory # B9781593278656
Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.
Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.
You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.
You'll learn how to:
- Make performant tools that can be used for your own security projects
- Create usable tools that interact with remote APIs
- Scrape arbitrary HTML data
- Use Go's standard package, net/http, for building HTTP servers
- Write your own DNS server and proxy
- Use DNS tunneling to establish a C2 channel out of a restrictive network
- Create a vulnerability fuzzer to discover an application's security weaknesses
- Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer
- Implant data within a Portable Network Graphics (PNG) image.
Are you ready to add to your arsenal of security tools? Then let's Go!
"About this title" may belong to another edition of this title.
Please order through the Abebooks checkout. We only take orders through Abebooks - We don't take direct orders by email or phone.
Refunds or Returns: A full refund of the purchase price will be given if returned within 30 days in undamaged condition.
As a seller on abebooks we adhere to the terms explained at http://www.abebooks.co.uk/docs/HelpCentral/buyerIndex.shtml - if you require further assistance please email us at orders@thesaintbookstore.co.uk
Most orders usually ship within 1-3 business days, but some can take up to 7 days.
| Order quantity | 7 to 28 business days | 7 to 28 business days |
|---|---|---|
| First item | £ 18.65 | £ 20.65 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.