|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Black Hat Go: Go-Programmierung für Hacker und Pentester von Tom Steele, Chris...

Famine Books
(6267)
Angemeldet als gewerblicher Verkäufer
US $24,99
Ca.CHF 20,15
Artikelzustand:
Neuwertig
very light wear
Ganz entspannt. Rückgaben akzeptiert.
Abholung:
Kostenlose Abholung in Las Vegas, Nevada, USA.
Versand:
Kostenlos USPS Media MailTM.
Standort: Las Vegas, Nevada, USA
Lieferung:
Lieferung zwischen Sa, 9. Aug und Di, 12. Aug nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:187130359323
Zuletzt aktualisiert am 13. Apr. 2025 03:26:51 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Neuwertig
Buch, das wie neu aussieht, aber bereits gelesen wurde. Der Einband weist keine sichtbaren Gebrauchsspuren auf. Bei gebundenen Büchern ist der Schutzumschlag vorhanden (sofern zutreffend). Alle Seiten sind vollständig vorhanden, es gibt keine zerknitterten oder eingerissenen Seiten und im Text oder im Randbereich wurden keine Unterstreichungen, Markierungen oder Notizen vorgenommen. Der Inneneinband kann minimale Gebrauchsspuren aufweisen. Minimale Gebrauchsspuren. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers. Alle Zustandsdefinitionen ansehenwird in neuem Fenster oder Tab geöffnet
Hinweise des Verkäufers
“very light wear”
ISBN
9781593278656
Book Title
Black Hat Go: Go Programming for Hackers and Pentesters

Über dieses Produkt

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278659
ISBN-13
9781593278656
eBay Product ID (ePID)
240287466

Product Key Features

Number of Pages
368 Pages
Language
English
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Publication Year
2020
Subject
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Type
Textbook
Subject Area
Computers
Author
Dan Kottmann, Tom Steele, Chris Patten
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
24.9 Oz
Item Length
9.1 in
Item Width
7 in

Additional Product Features

Intended Audience
Trade
LCCN
2019-041864
Dewey Edition
23
Reviews
"It's been incredibly fun having these kinds of projects, where you're not just learning syntax, you're not just learning the mechanics of Go, but you have things to build that are kind of fun." -- Johnny Boursiquot, Go Time Podcast
Dewey Decimal
005.8
Table Of Content
Chapter 1: Go Fundamentals and Concepts Chapter 2: TCP and Go: Scanners and Proxies Chapter 3: HTTP Clients: Remote Interaction with Tools Chapter 4: HTTP Servers: Routing and Middleware Chapter 5: Exploiting DNS: Recon and More Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole Chapter 7: Databases and Filesystems: Pilfering and Abusing Chapter 8: Packet Processing: Living on the Wire Chapter 9: Exploit Code: Writing and Porting Chapter 10: Extendable Tools: Using Go Plugins and LUA Chapter 11: Cryptography: Implementing and Attacking Chapter 12: Windows: System Interaction and Analysis Chapter 13: Steganography: Hiding Data Chapter 14: Command and Control: Building a RAT
Synopsis
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. In Black Hat Go , you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities as you learn how to: -Write a simple TCP proxy to use concurrency for non-parallel tasks -Create HTTP clients to perform common web interactions -Write a custom DNS server and proxy -Sniff and process packets using the gopacket library -Create extendable tools to expand program functionality -Write your own exploits with the help of insider techniques Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast., Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to- Make performant tools that can be used for your own security projects Create usable tools that interact with remote APIs Scrape arbitrary HTML data Use Go's standard package, net/http, for building HTTP servers Write your own DNS server and proxy Use DNS tunneling to establish a C2 channel out of a restrictive network Create a vulnerability fuzzer to discover an application's security weaknesses Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go!, Explore the darker side of the popular Go programming language while you test your systems, build and automate tools to fit your needs, and improve your security skillset., Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: - Make performant tools that can be used for your own security projects - Create usable tools that interact with remote APIs - Scrape arbitrary HTML data - Use Go's standard package, net/http, for building HTTP servers - Write your own DNS server and proxy - Use DNS tunneling to establish a C2 channel out of a restrictive network - Create a vulnerability fuzzer to discover an application's security weaknesses - Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer - Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go
LC Classification Number
QA76.9.A25S739 2020

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

Famine Books

99,6% positive Bewertungen19 Tsd. Artikel verkauft

Mitglied seit Dez 2016
Angemeldet als gewerblicher Verkäufer
Are you a book collector? Whether you're looking for the perfect copy of an old classic, a nice signed copy of something from your favorite author, the right cover to match the rest of your set, or a ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (7'128)

Alle Bewertungen
Positiv
Neutral
Negativ