|Listed in category:
This listing sold on Sun, 12 May at 4:55 AM.
Have one to sell?

Black Hat Go: Go Programming for Hackers and Pentesters Steele Patten Kottmann

Condition:
Very Good
Ended: May 13, 2024 04:55:07 SGT
Sold for:
US $20.30
ApproximatelyS$ 27.50
Was US $29.00 What does this price mean?
Recent sales price provided by the seller
Save US $8.70 (30% off)
Postage:
Free Economy Postage. See detailsfor shipping
Located in: Pocatello, Idaho, United States
Delivery:
Estimated between Mon, 24 Jun and Fri, 28 Jun to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the postage service selected, the seller's postage history, and other factors. Delivery times may vary, especially during peak periods.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Seller information

Seller assumes all responsibility for this listing.
eBay item number:235520067044

Item specifics

Condition
Very Good: A book that has been read but is in excellent condition. No obvious damage to the cover, ...
Binding
Paperback
Product Group
Book
Weight
1 lbs
IsTextBook
No
ISBN
9781593278656
Subject Area
Computers
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Publisher
No Starch Press, Incorporated
Item Length
9.1 in
Subject
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Publication Year
2020
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.9 in
Author
Dan Kottmann, Tom Steele, Chris Patten
Item Weight
24.9 Oz
Item Width
7 in
Number of Pages
368 Pages

About this product

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278659
ISBN-13
9781593278656
eBay Product ID (ePID)
240287466

Product Key Features

Number of Pages
368 Pages
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Language
English
Publication Year
2020
Subject
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Type
Textbook
Author
Dan Kottmann, Tom Steele, Chris Patten
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
24.9 Oz
Item Length
9.1 in
Item Width
7 in

Additional Product Features

Intended Audience
Trade
LCCN
2019-041864
Dewey Edition
23
Reviews
"It's been incredibly fun having these kinds of projects, where you're not just learning syntax, you're not just learning the mechanics of Go, but you have things to build that are kind of fun." -- Johnny Boursiquot, Go Time Podcast
Dewey Decimal
005.8
Table Of Content
Chapter 1: Go Fundamentals and Concepts Chapter 2: TCP and Go: Scanners and Proxies Chapter 3: HTTP Clients: Remote Interaction with Tools Chapter 4: HTTP Servers: Routing and Middleware Chapter 5: Exploiting DNS: Recon and More Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole Chapter 7: Databases and Filesystems: Pilfering and Abusing Chapter 8: Packet Processing: Living on the Wire Chapter 9: Exploit Code: Writing and Porting Chapter 10: Extendable Tools: Using Go Plugins and LUA Chapter 11: Cryptography: Implementing and Attacking Chapter 12: Windows: System Interaction and Analysis Chapter 13: Steganography: Hiding Data Chapter 14: Command and Control: Building a RAT
Synopsis
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. In Black Hat Go , you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities as you learn how to: -Write a simple TCP proxy to use concurrency for non-parallel tasks -Create HTTP clients to perform common web interactions -Write a custom DNS server and proxy -Sniff and process packets using the gopacket library -Create extendable tools to expand program functionality -Write your own exploits with the help of insider techniques Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast., Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to- Make performant tools that can be used for your own security projects Create usable tools that interact with remote APIs Scrape arbitrary HTML data Use Go's standard package, net/http, for building HTTP servers Write your own DNS server and proxy Use DNS tunneling to establish a C2 channel out of a restrictive network Create a vulnerability fuzzer to discover an application's security weaknesses Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go!, Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: - Make performant tools that can be used for your own security projects - Create usable tools that interact with remote APIs - Scrape arbitrary HTML data - Use Go's standard package, net/http, for building HTTP servers - Write your own DNS server and proxy - Use DNS tunneling to establish a C2 channel out of a restrictive network - Create a vulnerability fuzzer to discover an application's security weaknesses - Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer - Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go, Explore the darker side of the popular Go programming language while you test your systems, build and automate tools to fit your needs, and improve your security skillset.
LC Classification Number
QA76.9.A25S739 2020
Copyright Date
2020
ebay_catalog_id
4

Item description from the seller

TheBookBish

TheBookBish

100% positive feedback
7.1K items sold
Usually responds within 24 hours

Detailed Seller Ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
4.9
Shipping speed
5.0
Communication
5.0

Seller feedback (2,480)

s***o (95)- Feedback left by buyer.
Past month
Verified purchase
Book arrived in excellent condition, shipped fast, seller highly recommended! A+, 5 stars!!!
See all feedback