|Listed in category:
Have one to sell?

Black Hat Go: Go Programming for Hackers and Pentesters by Tom Steele,Chris ...

US $24.99
ApproximatelyRM 106.08
Condition:
Like New
very light wear
Breathe easy. Returns accepted.
Pickup:
Free local pickup from Las Vegas, Nevada, United States.
Shipping:
Free USPS Media MailTM.
Located in: Las Vegas, Nevada, United States
Delivery:
Estimated between Tue, 12 Aug and Thu, 14 Aug to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)

Shop with confidence

Top Rated Plus
Trusted seller, fast shipping, and easy returns. Learn more- Top Rated Plus - opens in a new window or tab
Seller assumes all responsibility for this listing.
eBay item number:187130359323
Last updated on Apr 13, 2025 09:26:51 MYTView all revisionsView all revisions

Item specifics

Condition
Like New
A book in excellent condition. Cover is shiny and undamaged, and the dust jacket is included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear. See all condition definitionsopens in a new window or tab
Seller Notes
“very light wear”
ISBN
9781593278656
Book Title
Black Hat Go: Go Programming for Hackers and Pentesters

About this product

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278659
ISBN-13
9781593278656
eBay Product ID (ePID)
240287466

Product Key Features

Number of Pages
368 Pages
Language
English
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Publication Year
2020
Subject
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Type
Textbook
Subject Area
Computers
Author
Dan Kottmann, Tom Steele, Chris Patten
Format
Trade Paperback

Dimensions

Item Height
0.9 in
Item Weight
24.9 Oz
Item Length
9.1 in
Item Width
7 in

Additional Product Features

Intended Audience
Trade
LCCN
2019-041864
Dewey Edition
23
Reviews
"It's been incredibly fun having these kinds of projects, where you're not just learning syntax, you're not just learning the mechanics of Go, but you have things to build that are kind of fun." -- Johnny Boursiquot, Go Time Podcast
Dewey Decimal
005.8
Table Of Content
Chapter 1: Go Fundamentals and Concepts Chapter 2: TCP and Go: Scanners and Proxies Chapter 3: HTTP Clients: Remote Interaction with Tools Chapter 4: HTTP Servers: Routing and Middleware Chapter 5: Exploiting DNS: Recon and More Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole Chapter 7: Databases and Filesystems: Pilfering and Abusing Chapter 8: Packet Processing: Living on the Wire Chapter 9: Exploit Code: Writing and Porting Chapter 10: Extendable Tools: Using Go Plugins and LUA Chapter 11: Cryptography: Implementing and Attacking Chapter 12: Windows: System Interaction and Analysis Chapter 13: Steganography: Hiding Data Chapter 14: Command and Control: Building a RAT
Synopsis
Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. In Black Hat Go , you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities as you learn how to: -Write a simple TCP proxy to use concurrency for non-parallel tasks -Create HTTP clients to perform common web interactions -Write a custom DNS server and proxy -Sniff and process packets using the gopacket library -Create extendable tools to expand program functionality -Write your own exploits with the help of insider techniques Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast., Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to- Make performant tools that can be used for your own security projects Create usable tools that interact with remote APIs Scrape arbitrary HTML data Use Go's standard package, net/http, for building HTTP servers Write your own DNS server and proxy Use DNS tunneling to establish a C2 channel out of a restrictive network Create a vulnerability fuzzer to discover an application's security weaknesses Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go!, Explore the darker side of the popular Go programming language while you test your systems, build and automate tools to fit your needs, and improve your security skillset., Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go. You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography. You'll learn how to: - Make performant tools that can be used for your own security projects - Create usable tools that interact with remote APIs - Scrape arbitrary HTML data - Use Go's standard package, net/http, for building HTTP servers - Write your own DNS server and proxy - Use DNS tunneling to establish a C2 channel out of a restrictive network - Create a vulnerability fuzzer to discover an application's security weaknesses - Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer - Implant data within a Portable Network Graphics (PNG) image. Are you ready to add to your arsenal of security tools? Then let's Go
LC Classification Number
QA76.9.A25S739 2020

Item description from the seller

About this seller

Famine Books

99.6% positive feedback19K items sold

Joined Dec 2016
Are you a book collector? Whether you're looking for the perfect copy of an old classic, a nice signed copy of something from your favorite author, the right cover to match the rest of your set, or a ...
See more

Detailed Seller Ratings

Average for the last 12 months
Accurate description
4.9
Reasonable shipping cost
5.0
Shipping speed
5.0
Communication
5.0

Seller feedback (7,130)

All ratings
Positive
Neutral
Negative