Black Hat Go Ebook Tooltip Go Programming For Hackers and Pentesters

Afbeeldingen

Inkijkexemplaar

Artikel vergelijken

  • Engels
  • E-book
  • 9781593278663
  • 04 februari 2020
  • Epub zonder kopieerbeveiliging (DRM)
Alle productspecificaties
  • Je leest ebooks gemakkelijk op je Kobo e-reader, of op je smartphone of tablet met de bol.com Kobo app. Let op! Ebooks kunnen niet geannuleerd of geretourneerd worden.

Samenvatting

Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.

Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.

You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.

You'll learn how to:

Make performant tools that can be used for your own security projects

Create usable tools that interact with remote APIs

Scrape arbitrary HTML data

Use Go's standard package, net/http, for building HTTP servers

Write your own DNS server and proxy

Use DNS tunneling to establish a C2 channel out of a restrictive network

Create a vulnerability fuzzer to discover an application's security weaknesses

Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer

Implant data within a Portable Network Graphics (PNG) image.

Are you ready to add to your arsenal of security tools? Then let's Go!

Productspecificaties

Inhoud

Taal
en
Bindwijze
E-book
Oorspronkelijke releasedatum
04 februari 2020
Ebook Formaat
Epub zonder kopieerbeveiliging (DRM)
Illustraties
Nee

Betrokkenen

Hoofdauteur
Chris Patten
Tweede Auteur
Tom Steele
Co Auteur
Dan Kottman
Hoofduitgeverij
No Starch Press

Lees mogelijkheden

Lees dit ebook op
Desktop (Mac en Windows) | Kobo e-reader | Android (smartphone en tablet) | iOS (smartphone en tablet) | Windows (smartphone en tablet)

Overige kenmerken

Studieboek
Nee

EAN

EAN
9781593278663

Je vindt dit artikel in

Taal
Engels
Boek, ebook of luisterboek?
Ebook
Studieboek of algemeen
Studieboeken
Beschikbaarheid
Leverbaar
Nog geen reviews

Kies gewenste uitvoering

Prijsinformatie en bestellen

De prijs van dit product is 22 euro en 99 cent.
Direct beschikbaar
Verkoop door bol
  • E-book is direct beschikbaar na aankoop
  • E-books lezen is voordelig
  • Dag en nacht klantenservice
  • Veilig betalen