Black Hat Go (häftad)
Häftad (Paperback / softback)
Antal sidor
No Starch Press,US
231 x 178 x 23 mm
704 g
Antal komponenter
Black Hat Go (häftad)

Black Hat Go

Go Programming For Hackers and Pentesters

Häftad Engelska, 2020-01-24
  • Skickas inom 7-10 vardagar.
  • Gratis frakt inom Sverige över 159 kr för privatpersoner.
Finns även som
Visa alla 1 format & utgåvor
In Black Hat Go, you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities. Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast.
Visa hela texten

Passar bra ihop

  1. Black Hat Go
  2. +
  3. Black Hat Python

De som köpt den här boken har ofta också köpt Black Hat Python av Justin Seitz (häftad).

Köp båda 2 för 699 kr


Har du läst boken? Sätt ditt betyg »

Fler böcker av författarna

Recensioner i media

"It's been incredibly fun having these kinds of projects, where you're not just learning syntax, you're not just learning the mechanics of Go, but you have things to build that are kind of fun." -Johnny Boursiquot, Go Time Podcast

Övrig information

Tom Steele, Dan Kottmann, and Chris Patten share over 30 years in penetration testing and offensive security experience, and have delivered multiple Go training and development sessions.


Chapter 1: Go Fundamentals and Concepts Chapter 2: TCP and Go: Scanners and Proxies Chapter 3: HTTP Clients: Remote Interaction with Tools Chapter 4: HTTP Servers: Routing and Middleware Chapter 5: Exploiting DNS: Recon and More Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole Chapter 7: Databases and Filesystems: Pilfering and Abusing Chapter 8: Packet Processing: Living on the Wire Chapter 9: Exploit Code: Writing and Porting Chapter 10: Extendable Tools: Using Go Plugins and LUA Chapter 11: Cryptography: Implementing and Attacking Chapter 12: Windows: System Interaction and Analysis Chapter 13: Steganography: Hiding Data Chapter 14: Command and Control: Building a RAT