Black Hat Go. Programming for Hackers and Pentesters
Black Hat Go explores the dark sides of Go — a popular programming language that is highly valued by hackers for its simplicity, efficiency, and reliability. This book — an arsenal of practical techniques for security professionals and hackers —...
will assist you in testing systems, creating and automating tools, as well as improving your threat countermeasure skills. All of this is achieved through the extensive capabilities of Go.
You will start with a basic overview of the language's syntax and the philosophy behind it, after which you will move on to studying examples useful for tool development. You will familiarize yourself with the HTTP, DNS, and SMB protocols. Next, you will delve into various tactics and tasks that pentesters encounter, covering topics such as data theft, network packet sniffing, and exploit development. You will learn to create dynamic embedded tools before moving on to the study of cryptography, attacks on Windows, and steganography.
Ready to expand your security tool arsenal? Then let's go!
Black Hat Go explores the dark sides of Go — a popular programming language that is highly valued by hackers for its simplicity, efficiency, and reliability. This book — an arsenal of practical techniques for security professionals and hackers — will assist you in testing systems, creating and automating tools, as well as improving your threat countermeasure skills. All of this is achieved through the extensive capabilities of Go.
You will start with a basic overview of the language's syntax and the philosophy behind it, after which you will move on to studying examples useful for tool development. You will familiarize yourself with the HTTP, DNS, and SMB protocols. Next, you will delve into various tactics and tasks that pentesters encounter, covering topics such as data theft, network packet sniffing, and exploit development. You will learn to create dynamic embedded tools before moving on to the study of cryptography, attacks on Windows, and steganography.
Ready to expand your security tool arsenal? Then let's go!
Be the first to know about our current discounts, offers and new products!
Check icon
You have added to your basket
Check icon
You have added to favourites
Sold out
The item is currently out of stock.
In stock
Available in warehouse. You will receive the exact delivery date from the operator after the order confirmation.
To order
The product is delivered directly from the publisher. The order processing time is up to 14 days, you will receive the exact delivery date from the operator after the order confirmation.
No circulation
Unfortunately, the print run of the book has ended, it is currently unavailable for order.