logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Black Hat Go: Go Programming For Hackers And Pentesters by Tom Steele, Chris Patten, Dan Kottmann ISBN 9781593278656, 9781593278663, 1593278659, 1593278667

  • SKU: EBN-11233138
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Black Hat Go: Go Programming For Hackers And Pentesters after payment.
Authors:Tom Steele, Chris Patten, Dan Kottmann
Pages:370 pages.
Year:2020
Editon:1st Edition
Publisher:No Starch Press
Language:english
File Size:6.57 MB
Format:pdf
ISBNS:9781593278656, 9781593278663, 1593278659, 1593278667
Categories: Ebooks

Product desciption

(Ebook) Black Hat Go: Go Programming For Hackers And Pentesters by Tom Steele, Chris Patten, Dan Kottmann ISBN 9781593278656, 9781593278663, 1593278659, 1593278667

Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You’ll begin your journey with a basic overview of Go’s syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You’ll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You’ll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll Learn how to:
• Make performant tools that can be used for your own security projects
• Create usable tools that interact with remote APIs
• Scrape arbitrary HTML data
• Use Go’s standard package, net/http, for building HTTP servers
• Write your own DNS server and proxy
• Use DNS tunneling to establish a C2 channel out of a restrictive network
• Create a vulnerability fuzzer to discover an application’s security weaknesses
• Use plug-ins and extensions to future-proof products
• Use plug-ins and extensions to future-proof products
• Build an RC2 symmetric-key brute-forcer
• Implant data within a Portable Network Graphics (PNG) image
Are you ready to add to your arsenal of security tools? Then let’s Go!
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products