HjemGrupperSnakMereZeitgeist
Søg På Websted
På dette site bruger vi cookies til at levere vores ydelser, forbedre performance, til analyseformål, og (hvis brugeren ikke er logget ind) til reklamer. Ved at bruge LibraryThing anerkender du at have læst og forstået vores vilkår og betingelser inklusive vores politik for håndtering af brugeroplysninger. Din brug af dette site og dets ydelser er underlagt disse vilkår og betingelser.

Resultater fra Google Bøger

Klik på en miniature for at gå til Google Books

Black Hat Go : Go programming for hackers…
Indlæser...

Black Hat Go : Go programming for hackers and pentesters (udgave 2020)

af (Security Consultant) Tom Steele, Chris Patten (Author.), Dan Kottmann (Author.)

MedlemmerAnmeldelserPopularitetGennemsnitlig vurderingSamtaler
1Ingen7,654,230IngenIngen
Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You’ll begin your journey with a basic overview of Go’s syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You’ll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You’ll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: •Make performant tools that can be used for your own security projects •Create usable tools that interact with remote APIs •Scrape arbitrary HTML data •Use Go’s standard package, net/http, for building HTTP servers •Write your own DNS server and proxy •Use DNS tunneling to establish a C2 channel out of a restrictive network •Create a vulnerability fuzzer to discover an application’s security weaknesses •Use plug-ins and extensions to future-proof products •Use plug-ins and extensions to future-proof products •Build an RC2 symmetric-key brute-forcer •Implant data within a Portable Network Graphics (PNG) image Are you ready to add to your arsenal of security tools? Then let’s Go!… (mere)
Medlem:zakman14
Titel:Black Hat Go : Go programming for hackers and pentesters
Forfattere:(Security Consultant) Tom Steele
Andre forfattere:Chris Patten (Author.), Dan Kottmann (Author.)
Info:San Francisco : No Starch Press, 2020.
Samlinger:Dit bibliotek
Vurdering:
Nøgleord:Ingen

Work Information

Black Hat Go : Go programming for hackers and pentesters af Tom Steele

Nyligt tilføjet afzakman14

Ingen nøgleord

Ingen
Indlæser...

Bliv medlem af LibraryThing for at finde ud af, om du vil kunne lide denne bog.

Der er ingen diskussionstråde på Snak om denne bog.

Ingen anmeldelser
ingen anmeldelser | tilføj en anmeldelse
Du bliver nødt til at logge ind for at redigere data i Almen Viden.
For mere hjælp se Almen Viden hjælpesiden.
Kanonisk titel
Originaltitel
Alternative titler
Oprindelig udgivelsesdato
Personer/Figurer
Vigtige steder
Vigtige begivenheder
Beslægtede film
Indskrift
Tilegnelse
Første ord
Citater
Sidste ord
Oplysning om flertydighed
Forlagets redaktører
Bagsidecitater
Originalsprog
Canonical DDC/MDS
Canonical LCC

Henvisninger til dette værk andre steder.

Wikipedia på engelsk

Ingen

Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You’ll begin your journey with a basic overview of Go’s syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You’ll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You’ll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: •Make performant tools that can be used for your own security projects •Create usable tools that interact with remote APIs •Scrape arbitrary HTML data •Use Go’s standard package, net/http, for building HTTP servers •Write your own DNS server and proxy •Use DNS tunneling to establish a C2 channel out of a restrictive network •Create a vulnerability fuzzer to discover an application’s security weaknesses •Use plug-ins and extensions to future-proof products •Use plug-ins and extensions to future-proof products •Build an RC2 symmetric-key brute-forcer •Implant data within a Portable Network Graphics (PNG) image Are you ready to add to your arsenal of security tools? Then let’s Go!

No library descriptions found.

Beskrivelse af bogen
Haiku-resume

Current Discussions

Ingen

Populære omslag

Ingen

Quick Links

Vurdering

Gennemsnit: Ingen vurdering.

Er det dig?

Bliv LibraryThing-forfatter.

 

Om | Kontakt | LibraryThing.com | Brugerbetingelser/Håndtering af brugeroplysninger | Hjælp/FAQs | Blog | Butik | APIs | TinyCat | Efterladte biblioteker | Tidlige Anmeldere | Almen Viden | 202,657,594 bøger! | Topbjælke: Altid synlig