Black Hat Go: Go Programming For Hackers And Pentesters Paperback
AED 113.00(Inclusive of VAT)
Deliver to Dubai
Enjoy hassle free returns with this offer
Always In Stock
Ships On Time
How are these calculated?
How are the scores calculated?
A seller must receive a minimum number of orders over the past 3 months to be rated.
What does Always In Stock mean?
A seller with a 100% “Always In Stock” score, will always have stock to fulfill your order, meaning your orders will not be cancelled due to stock shortage.
What does Ships On Time mean?
A seller with a 100% “Ships On Time” score, will always ship your orders on time, meaning you will not face any delays and will always get your orders on the promised date.
- FREE RETURNSGet free returns on eligible items
- TRUSTED SHIPPINGFree shipping when you spend AED 100 and above on express items
- CONTACTLESS DELIVERYYour delivery will be left at your door, valid on prepaid orders only.
|About the Author||Tom Steele, Dan Kottmann, and Chris Patten share over 30 years in penetration testing and offensive security experience, and have delivered multiple Go training and development sessions|
|Author 1||Tom Steele|
|Author 2||Chris Patten|
|Author 3||Dan Kottman|
|Book Description||Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: - Make performant tools that can be used for your own security projects - Create usable tools that interact with remote APIs - Scrape arbitrary HTML data - Use Go's standard package, net/http, for building HTTP servers - Write your own DNS server and proxy - Use DNS tunneling to establish a C2 channel out of a restrictive network - Create a vulnerability fuzzer to discover an application's security weaknesses - Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer - Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go|
|Number of Pages||368|
|Publication Date||04 Feb 2020|