Book description
Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.
You’ll begin your journey with a basic overview of Go’s syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You’ll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You’ll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.
You'll learn how to:
•Make performant tools that can be used for your own security projects
•Create usable tools that interact with remote APIs
•Scrape arbitrary HTML data
•Use Go’s standard package, net/http, for building HTTP servers
•Write your own DNS server and proxy
•Use DNS tunneling to establish a C2 channel out of a restrictive network
•Create a vulnerability fuzzer to discover an application’s security weaknesses
•Use plug-ins and extensions to future-proof products
•Use plug-ins and extensions to future-proof products
•Build an RC2 symmetric-key brute-forcer
•Implant data within a Portable Network Graphics (PNG) image
Are you ready to add to your arsenal of security tools? Then let’s Go!
Table of contents
- Cover Page
- Title Page
- Copyright Page
- About the Authors
- BRIEF CONTENTS
- CONTENTS IN DETAIL
- FOREWORD
- ACKNOWLEDGMENTS
- INTRODUCTION
- 1 GO FUNDAMENTALS
- 2 TCP, SCANNERS, AND PROXIES
- 3 HTTP CLIENTS AND REMOTE INTERACTION WITH TOOLS
- 4 HTTP SERVERS, ROUTING, AND MIDDLEWARE
- 5 EXPLOITING DNS
- 6 INTERACTING WITH SMB AND NTLM
- 7 ABUSING DATABASES AND FILESYSTEMS
- 8 RAW PACKET PROCESSING
- 9 WRITING AND PORTING EXPLOIT CODE
- 10 GO PLUGINS AND EXTENDABLE TOOLS
- 11 IMPLEMENTING AND ATTACKING CRYPTOGRAPHY
- 12 WINDOWS SYSTEM INTERACTION AND ANALYSIS
- 13 HIDING DATA WITH STEGANOGRAPHY
- 14 BUILDING A COMMAND-AND-CONTROL RAT
- Index
Product information
- Title: Black Hat Go
- Author(s):
- Release date: January 2020
- Publisher(s): No Starch Press
- ISBN: 9781593278656
You might also like
book
Black Hat Python, 2nd Edition
When it comes to creating powerful and effective hacking tools, Python is the language of choice …
book
Head First Go
What will you learn from this book? Go makes it easy to build software that’s simple, …
book
Learning Helm
Get up to speed with Helm, the preeminent package manager for the Kubernetes container orchestration system. …
book
Practical Go
Step-by-step instruction on writing your first production-ready servers with Golang Google's Go language, otherwise known as …