product
1132427Black Hat Gohttps://www.gandhi.com.mx/black-hat-go/phttps://gandhi.vtexassets.com/arquivos/ids/357194/2d127e4e-0311-4ec5-b8ae-805b2e33f24f.jpg?v=638334376174930000531738MXNNo Starch PressInStock/Ebooks/<p><strong>Like the best-selling <em>Black Hat Python</em>, <em>Black Hat Go</em> explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.</strong></p><p><em>Black Hat Go</em> explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.</p><p>Youll begin your journey with a basic overview of Gos syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. Youll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. Youll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.</p><p>Youll learn how to:</p><p>Make performant tools that can be used for your own security projects</p><p>Create usable tools that interact with remote APIs</p><p>Scrape arbitrary HTML data</p><p>Use Gos standard package, net/http, for building HTTP servers</p><p>Write your own DNS server and proxy</p><p>Use DNS tunneling to establish a C2 channel out of a restrictive network</p><p>Create a vulnerability fuzzer to discover an applications security weaknesses</p><p>Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer</p><p>Implant data within a Portable Network Graphics (PNG) image.</p><p>Are you ready to add to your arsenal of security tools? Then lets Go!</p>...1124293Black Hat Go531738https://www.gandhi.com.mx/black-hat-go/phttps://gandhi.vtexassets.com/arquivos/ids/357194/2d127e4e-0311-4ec5-b8ae-805b2e33f24f.jpg?v=638334376174930000InStockMXN99999DIEbook20209781593278663_W3siaWQiOiJkZjU0OWY3Yi0xZDM0LTQ2Y2ItODdmNC1hOTg0MTRlODZjZTciLCJsaXN0UHJpY2UiOjcxOSwiZGlzY291bnQiOjIwMSwic2VsbGluZ1ByaWNlIjo1MTgsImluY2x1ZGVzVGF4Ijp0cnVlLCJwcmljZVR5cGUiOiJXaG9sZXNhbGUiLCJjdXJyZW5jeSI6Ik1YTiIsImZyb20iOiIyMDI0LTEyLTAxVDAwOjAwOjAwWiIsInJlZ2lvbiI6Ik1YIiwiaXNQcmVvcmRlciI6ZmFsc2V9XQ==9781593278663_<p><strong>Like the best-selling <em>Black Hat Python</em>, <em>Black Hat Go</em> explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.</strong></p><p><em>Black Hat Go</em> explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.</p><p>Youll begin your journey with a basic overview of Gos syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. Youll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. Youll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.</p><p>Youll learn how to:</p><p>Make performant tools that can be used for your own security projects</p><p>Create usable tools that interact with remote APIs</p><p>Scrape arbitrary HTML data</p><p>Use Gos standard package, net/http, for building HTTP servers</p><p>Write your own DNS server and proxy</p><p>Use DNS tunneling to establish a C2 channel out of a restrictive network</p><p>Create a vulnerability fuzzer to discover an applications security weaknesses</p><p>Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer</p><p>Implant data within a Portable Network Graphics (PNG) image.</p><p>Are you ready to add to your arsenal of security tools? Then lets Go!</p>...9781593278663_No Starch Presslibro_electonico_83a290b4-2e98-3888-af55-d0a7cdbcb9c2_9781593278663;9781593278663_9781593278663Dan KottmannInglésMéxicohttps://getbook.kobo.com/koboid-prod-public/randomhousewh-epub-154a4d68-7d95-4d48-8e60-2c666702e0c1.epub2020-02-04T00:00:00+00:00No Starch Press