Black Hat Go: Go Programming For Hackers and Pentesters
Authors: Tom Steele – Chris Patten – Dan Kottmann
ISBN-10: 1593278659
ISBN-13: 9781593278656
Released: 2020-01-24
Print Length 页数: 368 pages
Book Description
Like the best-selling Black Hat Python,Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems,build and automate tools to fit your needs,and improve your offensive security skillset.
Black Hat Go explores the darker side of Go,the popular programming language revered by hackers for its simplicity,efficiency,and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems,build and automate tools to fit your needs,and improve your offensive security skillset,all using the power of Go.
You’ll begin your journey with a basic overview of Go’s syntax and philosophy and then start to explore examples that you can leverage for tool development,including common network protocols like HTTP,DNS,and SMB. You’ll then dig into various tactics and problems that penetration testers encounter,addressing things like data pilfering,packet sniffing,and exploit development. You’ll create dynamic,pluggable tools before diving into cryptography,attacking Microsoft Windows,and implementing steganography.
You’ll learn how to:
Make performant tools that can be used for your own security projects
Create usable tools that interact with remote APIs
Scrape arbitrary HTML data
Use Go’s standard package,net/http,for building HTTP servers
Write your own DNS server and proxy
Use DNS tunneling to establish a C2 channel out of a restrictive network
Create a vulnerability fuzzer to discover an application’s security weaknesses
Use plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcer
Implant data within a Portable Network Graphics (PNG) image.
CONTENTS IN DETAIL
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
1GO FUNDAMENTALS
2 TCP,SCANNERS,AND PROXIES
3 HTTP CLIENTS AND REMOTE INTERACTION WITH TOOLS
4 HTTP SERVERS,ROUTING,AND MIDDLEWARE
5 EXPLOITING DNS
6 INTERACTING WITH SMB AND NTLM
7 ABUSING DATABASES AND FILESYSTEMS
8 RAW PACKET PROCESSING
9 WRITING AND PORTING EXPLOIT CODE
10 GO PLUGINS AND EXTENDABLE TOOLS
11 IMPLEMENTING AND ATTACKING CRYPTOGRAPHY
12 WINDOWS SYSTEM INTERACTION AND ANALYSIS
13 HIDING DATA WITH STEGANOGRAPHY
14 BUILDING A COMMAND-AND-CONTROL RAT
Index
Black Hat Go Go Programming For Hackers and Pentesters 9781593278656. zip[/erphpdown]