Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.
In Black Hat Go, you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities as you learn how to:
-Write a simple TCP proxy to use concurrency for non-parallel tasks
-Create HTTP clients to perform common web interactions
-Write a custom DNS server and proxy
-Sniff and process packets using the gopacket library
-Create extendable tools to expand program functionality
-Write your own exploits with the help of insider techniques
Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast.
"synopsis" may belong to another edition of this title.
Tom Steele, Dan Kottmann, and Chris Patten share over 30 years in penetration testing and offensive security experience, and have delivered multiple Go training and development sessions.
"About this title" may belong to another edition of this title.
Shipping:
US$ 3.75
Within U.S.A.
Shipping:
FREE
Within U.S.A.
Seller: HPB-Red, Dallas, TX, U.S.A.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!. Seller Inventory # S_374557256
Quantity: 1 available
Seller: booksXpress, Bayonne, NJ, U.S.A.
Soft Cover. Condition: new. Seller Inventory # 9781593278656
Quantity: 10 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 29704671
Quantity: 3 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: As New. Unread copy in mint condition. Seller Inventory # RH9781593278656
Quantity: Over 20 available
Seller: Books Unplugged, Amherst, NY, U.S.A.
Condition: Good. Buy with confidence! Book is in good condition with minor wear to the pages, binding, and minor marks within 1.54. Seller Inventory # bk1593278659xvz189zvxgdd
Quantity: 1 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 29704671-n
Quantity: 3 available
Seller: INDOO, Avenel, NJ, U.S.A.
Condition: New. Brand New. Seller Inventory # 9781593278656
Quantity: Over 20 available
Seller: GF Books, Inc., Hawthorne, CA, U.S.A.
Condition: Very Good. Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 1.54. Seller Inventory # 1593278659-2-3
Quantity: 1 available
Seller: Grand Eagle Retail, Wilmington, DE, U.S.A.
Paperback. Condition: new. Paperback. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.You'll learn how to-Make performant tools that can be used for your own security projectsCreate usable tools that interact with remote APIsScrape arbitrary HTML dataUse Go's standard package, net/http, for building HTTP serversWrite your own DNS server and proxyUse DNS tunneling to establish a C2 channel out of a restrictive networkCreate a vulnerability fuzzer to discover an application's security weaknessesUse plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcerImplant data within a Portable Network Graphics (PNG) image.Are you ready to add to your arsenal of security tools? Then let's Go!Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.You'll learn how to-Make performant tools that can be used for your own security projectsCreate usable tools that interact with remote APIsScrape arbitrary HTML dataUse Go's standard package, net/http, for building HTTP serversWrite your own DNS server and proxyUse DNS tunneling to establish a C2 channel out of a restrictive networkCreate a vulnerability fuzzer to discover an application's security weaknessesUse plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcerImplant data within a Portable Network Graphics (PNG) image.Are you ready to add to your arsenal of security tools? Then let's Go! Explore the darker side of the popular Go programming language while you test your systems, build and automate tools to fit your needs, and improve your security skillset. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781593278656
Quantity: 1 available
Seller: medimops, Berlin, Germany
Condition: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present. Seller Inventory # M01593278659-G
Quantity: 2 available