Torrent details for "Black Hat Go: Go Programming for Hackers and Pentesters (Early Access) [NulledPremium]"    Log in to bookmark

Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
5.13 MB
Info Hash:
ee61b0ffde1dd8b7c4241f1721dbeec116253440
Added By:
Added:  
07-02-2020 13:37
Views:
789
Health:
Seeds:
0
Leechers:
0
Completed:
306




Description
For More Ebooks Visit NulledPremium >>> NulledPremium.com

Image error

Book details

File Size: 5.13 MB
Format: pdf
Print Length: 368 pages
Publisher: No Starch Press (February 4, 2020)
Publication Date: February 4, 2020
Sold by: Amazon.com Services LLC
Language: English
ASIN: B073NPY29N

Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.



Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.

You’ll begin your journey with a basic overview of Go’s syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You’ll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You’ll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.

You’ll learn how to:
• Make performant tools that can be used for your own security projects
• Create usable tools that interact with remote APIs
• Scrape arbitrary HTML data
• Use Go’s standard package, net/http, for building HTTP servers
• Write your own DNS server and proxy
• Use DNS tunneling to establish a C2 channel out of a restrictive network
• Create a vulnerability fuzzer to discover an application’s security weaknesses
• Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer
• Implant data within a Portable Network Graphics (PNG) image.

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes