Black Hat Go: Go Programming for Hackers and Pentesters

Black Hat Go: Go Programming for Hackers and Pentesters

  • Downloads:7072
  • Type:Epub+TxT+PDF+Mobi
  • Create Date:2021-07-20 08:54:02
  • Update Date:2025-09-06
  • Status:finish
  • Author:Tom Steele
  • ISBN:1593278659
  • Environment:PC/Android/iPhone/iPad/Kindle

Summary

Like the best-selling Black Hat PythonBlack Hat Go explores the darker side of the popular Go programming language。 This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset。

Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability。 It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go。

You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB。 You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development。 You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography。

You'll learn how to:
- Make performant tools that can be used for your own security projects
- Create usable tools that interact with remote APIs
- Scrape arbitrary HTML data
- Use Go's standard package, net/http, for building HTTP servers
- Write your own DNS server and proxy
- Use DNS tunneling to establish a C2 channel out of a restrictive network
- Create a vulnerability fuzzer to discover an application's security weaknesses
- Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer
- Implant data within a Portable Network Graphics (PNG) image。

Are you ready to add to your arsenal of security tools? Then let's Go!

Download

Reviews

Michal

I'm not sure who should benefit from this book。 It's not good book about Go or hacking or security or anything。 Every topic is just scratched on the surface, and if you know at least a bit about any topic, you will hardly find it useful。 Not worth the time at all。 I'm not sure who should benefit from this book。 It's not good book about Go or hacking or security or anything。 Every topic is just scratched on the surface, and if you know at least a bit about any topic, you will hardly find it useful。 Not worth the time at all。 。。。more

Lyuben

It's OK for basic stuff and getting started, but don't expect deep knowledge or inspiration。Not a seminal book to be remembered, better get it used or rent it。 It's OK for basic stuff and getting started, but don't expect deep knowledge or inspiration。Not a seminal book to be remembered, better get it used or rent it。 。。。more

Fahad

I did find myself googling for code snippets, reading more docs about Go language and even watch a few YT video。the Black series like python was a killer books and well written。 This book lacks in both technical/coding stuffs and also the writing style was not good enough with not much of explanations。It's a rare case to give a book 2 star ratings however in this case I did that because the book deserve it。 need much much improvement and more time in presenting the concepts and why use it。 it's I did find myself googling for code snippets, reading more docs about Go language and even watch a few YT video。the Black series like python was a killer books and well written。 This book lacks in both technical/coding stuffs and also the writing style was not good enough with not much of explanations。It's a rare case to give a book 2 star ratings however in this case I did that because the book deserve it。 need much much improvement and more time in presenting the concepts and why use it。 it's not in a par for usual No starch publishing, Sorry。 。。。more

Henry

Lot's of great examples of some simple problems, but it didn't go too in depth into pentesting techniques or security。 It also felt like an intro to Go book, which probably limited what examples could be shown。 Perhaps I'm biased against these types of combo books (intro language + intro topic), but I wish it was longer going deeper into discussion, or instead assume more knowledge and be able to fit into the given pages。 Lot's of great examples of some simple problems, but it didn't go too in depth into pentesting techniques or security。 It also felt like an intro to Go book, which probably limited what examples could be shown。 Perhaps I'm biased against these types of combo books (intro language + intro topic), but I wish it was longer going deeper into discussion, or instead assume more knowledge and be able to fit into the given pages。 。。。more

David González

Este libro es un compendio muy variado de implementaciones en Go de mecanismos de ataque y extracción de información。 Cada módulo del libro se enfoca en una tecnología: DNS, sistemas de ficheros y bases de datos, esteganografía, etcétera, y cada uno tiene una breve introducción teórica para poner en situación las implicaciones y el impacto que puede conseguir。 El desarrollo de la implementación está bien explicado sin extenderse demasiado en conceptos básicos, siendo útil también para profundiza Este libro es un compendio muy variado de implementaciones en Go de mecanismos de ataque y extracción de información。 Cada módulo del libro se enfoca en una tecnología: DNS, sistemas de ficheros y bases de datos, esteganografía, etcétera, y cada uno tiene una breve introducción teórica para poner en situación las implicaciones y el impacto que puede conseguir。 El desarrollo de la implementación está bien explicado sin extenderse demasiado en conceptos básicos, siendo útil también para profundizar en aprender y mejorar el conocimiento general en Go。 Cuenta con un módulo dedicado a introducción de Go, que evidentemente su función es más de referencia que explicativa, y acaba con un módulo muy ámbicioso para desarrollar un sistema de comando y control mínimo pero completo。 。。。more

Pta Nahi

I like it