|Listed in category:
This listing sold on Sun, May 12 at 4:55 PM.
Have one to sell?

Black Hat Go: Go Programming for Hackers and Pentesters Steele Patten Kottmann

Condition:
Very Good
Ended: May 12, 2024 16:55:07 EDT
Sold for:
US $20.30
ApproximatelyC $27.75
Was US $29.00 What does this price mean?
Recent sales price provided by the seller
Save US $8.70 (30% off)
Shipping:
Free Economy Shipping. See detailsfor shipping
Located in: Pocatello, Idaho, United States
Delivery:
Estimated between Sat, Jun 1 and Thu, Jun 6 to 43230
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Payments:
     

Shop with confidence

eBay Money Back Guarantee
Get the item you ordered or your money back. 

Seller information

Seller assumes all responsibility for this listing.
eBay item number:235520067044

Item specifics

Condition
Very Good: A book that does not look new and has been read but is in excellent condition. No obvious ...
Binding
Paperback
Product Group
Book
Weight
1 lbs
IsTextBook
No
ISBN
9781593278656
Item Length
9.1in
Publisher
No Starch Press, Incorporated
Publication Year
2020
Type
Textbook
Format
Trade Paperback
Language
English
Item Height
0.9in
Author
Dan Kottmann, Tom Steele, Chris Patten
Genre
Computers
Topic
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Item Width
7in
Item Weight
24.9 Oz
Number of Pages
368 Pages

About this product

Product Information

Like the best-selling Black Hat Python , Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. In Black Hat Go , you'll learn how to write powerful and effective penetration testing tools in Go, a language revered for its speed and scalability. Start off with an introduction to Go fundamentals like data types, control structures, and error handling; then, dive into the deep end of Go's offensive capabilities as you learn how to: -Write a simple TCP proxy to use concurrency for non-parallel tasks -Create HTTP clients to perform common web interactions -Write a custom DNS server and proxy -Sniff and process packets using the gopacket library -Create extendable tools to expand program functionality -Write your own exploits with the help of insider techniques Black Hat Go will show you how to build powerful security tools to pen test huge networks, fast.

Product Identifiers

Publisher
No Starch Press, Incorporated
ISBN-10
1593278659
ISBN-13
9781593278656
eBay Product ID (ePID)
240287466

Product Key Features

Author
Dan Kottmann, Tom Steele, Chris Patten
Format
Trade Paperback
Language
English
Topic
Programming Languages / General, Security / General, Security / Viruses & Malware, Security / Networking
Publication Year
2020
Type
Textbook
Genre
Computers
Number of Pages
368 Pages

Dimensions

Item Length
9.1in
Item Height
0.9in
Item Width
7in
Item Weight
24.9 Oz

Additional Product Features

Lc Classification Number
Qa76.9.A25s739 2020
Reviews
"It's been incredibly fun having these kinds of projects, where you're not just learning syntax, you're not just learning the mechanics of Go, but you have things to build that are kind of fun." -- Johnny Boursiquot, Go Time Podcast
Publication Name
Black Hat Go : Go Programming for Hackers and Pentesters
Table of Content
Chapter 1: Go Fundamentals and Concepts Chapter 2: TCP and Go: Scanners and Proxies Chapter 3: HTTP Clients: Remote Interaction with Tools Chapter 4: HTTP Servers: Routing and Middleware Chapter 5: Exploiting DNS: Recon and More Chapter 6: SMB and NTLM: A Peek Down the Rabbit Hole Chapter 7: Databases and Filesystems: Pilfering and Abusing Chapter 8: Packet Processing: Living on the Wire Chapter 9: Exploit Code: Writing and Porting Chapter 10: Extendable Tools: Using Go Plugins and LUA Chapter 11: Cryptography: Implementing and Attacking Chapter 12: Windows: System Interaction and Analysis Chapter 13: Steganography: Hiding Data Chapter 14: Command and Control: Building a RAT
Copyright Date
2020
Lccn
2019-041864
Dewey Decimal
005.8
Intended Audience
Trade
Dewey Edition
23

Item description from the seller

TheBookBish

TheBookBish

100% positive feedback
7.0K items sold
Usually responds within 24 hours

Detailed seller ratings

Average for the last 12 months

Accurate description
4.9
Reasonable shipping cost
4.9
Shipping speed
5.0
Communication
5.0

Seller feedback (2,465)

s***o (94)- Feedback left by buyer.
Past month
Verified purchase
Book arrived in excellent condition, shipped fast, seller highly recommended! A+, 5 stars!!!
See all feedback

Product ratings and reviews

No ratings or reviews yet
Be the first to write the review.