Deze aanbieding is verkocht op zo, 12 mei om 10:55 PM.
Hebt u iets om te verkopen?

Black Hat Go: Go Programming for Hackers and Pentesters Steele Patten Kottmann

Objectstaat:
Heel goed
Afgelopen: 12 mei 2024 22:55:07 CEST
Verkocht voor:
US $20,30
OngeveerEUR 19,00
Was US $29,00 Wat betekent deze prijs?
Recente verkoopprijs (door de verkoper verstrekt)
Bespaar US $8,70 (30% korting)
Verzendkosten:
Gratis Voordelige verzendservice. Details bekijkenvoor verzending
Bevindt zich in: Pocatello, Idaho, Verenigde Staten
Levering:
Geschatte levering tussen vr, 28 jun en di, 2 jul tot 43230
De levertijd wordt geschat met onze eigen methode op basis van onder meer de nabijheid van de koper ten opzichte van de objectlocatie, de geselecteerde verzendservice, en de verzendgeschiedenis van de verkoper. De leveringstermijnen kunnen variëren, vooral gedurende piekperiodes.
Retourbeleid:
Betalingen:
     

Winkel met vertrouwen

Geld-terug-garantie van eBay
Ontvang het object dat u hebt besteld of krijg uw geld terug. 

Verkopergegevens

Geregistreerd als particuliere verkoper, dus de consumentenrechten die voortvloeien uit de EU-wetgeving inzake consumentenbescherming zijn niet van toepassing. De geld-terug-garantie van eBay geldt nog steeds voor de meeste aankopen.
De verkoper neemt de volledige verantwoordelijkheid voor deze aanbieding.
eBay-objectnummer:235520067044

Specificaties

Objectstaat
Heel goed: Een boek dat er niet als nieuw uitziet en is gelezen, maar zich in uitstekende staat ...
Binding
Paperback
Product Group
Book
Weight
1 lbs
IsTextBook
No
ISBN
9781593278656
Subject Area
Computers
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Publisher
No Starch Press, Incorporated
Item Length
9.1 in
Subject
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Publication Year
2020
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.9 in
Author
Dan Kottmann, Tom Steele, Chris Patten
Item Weight
24.9 Oz
Item Width
7 in
Number of Pages
368 Pages

Over dit product

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278659
ISBN-13
9781593278656
eBay Product ID (ePID)
240287466

Product Key Features

Number of Pages
368 Pages
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Language
English
Publication Year
2020
Subject
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Type
Textbook
Author
Dan Kottmann, Tom Steele, Chris Patten
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
24.9 Oz
Item Length
9.1 in
Item Width
7 in

Additional Product Features

Intended Audience
Trade
LCCN
2019-041864
Dewey Edition
23
Reviews
"It's been incredibly fun having these kinds of projects, where you're not just learning syntax, you're not just learning the mechanics of Go, but you have things to build that are kind of fun." -- Johnny Boursiquot, Go Time Podcast
Dewey Decimal
005.8
Table Of Content
Chapter 1: Go Fundamentals and Concepts Chapter 2: TCP and Go: Scanners and Proxies Chapter 3: HTTP Clients: Remote Interaction with Tools Chapter 4: HTTP Servers: Routing and Middleware Chapter 5: Exploiting DNS: Recon and More Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole Chapter 7: Databases and Filesystems: Pilfering and Abusing Chapter 8: Packet Processing: Living on the Wire Chapter 9: Exploit Code: Writing and Porting Chapter 10: Extendable Tools: Using Go Plugins and LUA Chapter 11: Cryptography: Implementing and Attacking Chapter 12: Windows: System Interaction and Analysis Chapter 13: Steganography: Hiding Data Chapter 14: Command and Control: Building a RAT
Synopsis
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. In Black Hat Go , you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities as you learn how to: -Write a simple TCP proxy to use concurrency for non-parallel tasks -Create HTTP clients to perform common web interactions -Write a custom DNS server and proxy -Sniff and process packets using the gopacket library -Create extendable tools to expand program functionality -Write your own exploits with the help of insider techniques Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast., Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to- Make performant tools that can be used for your own security projects Create usable tools that interact with remote APIs Scrape arbitrary HTML data Use Go's standard package, net/http, for building HTTP servers Write your own DNS server and proxy Use DNS tunneling to establish a C2 channel out of a restrictive network Create a vulnerability fuzzer to discover an application's security weaknesses Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go!, Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: - Make performant tools that can be used for your own security projects - Create usable tools that interact with remote APIs - Scrape arbitrary HTML data - Use Go's standard package, net/http, for building HTTP servers - Write your own DNS server and proxy - Use DNS tunneling to establish a C2 channel out of a restrictive network - Create a vulnerability fuzzer to discover an application's security weaknesses - Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer - Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go, Explore the darker side of the popular Go programming language while you test your systems, build and automate tools to fit your needs, and improve your security skillset.
LC Classification Number
QA76.9.A25S739 2020
Copyright Date
2020
ebay_catalog_id
4

Objectbeschrijving van de verkoper

TheBookBish

TheBookBish

100% positieve feedback
7,1K objecten verkocht
Reageert meestal binnen 24 uur

Gedetailleerde verkopersbeoordelingen

Gemiddelde van de afgelopen 12 maanden

Nauwkeurige beschrijving
4.9
Redelijke verzendkosten
4.9
Verzendtijd
5.0
Communicatie
5.0
Geregistreerd als particuliere verkoper
Dus de consumentenrechten die voortvloeien uit EU-wetgeving voor consumentenbescherming zijn niet van toepassing. eBay-kopersbescherming geldt nog steeds voor de meeste aankopen.

Feedback verkoper (2.482)

s***o (95)- Feedback gegeven door koper.
Afgelopen maand
Geverifieerde aankoop
Book arrived in excellent condition, shipped fast, seller highly recommended! A+, 5 stars!!!
Alle feedback weergeven