𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Black Hat Go: Go Programming For Hackers and Pentesters 1

✍ Scribed by Tom Steele, Chris Patten, Dan Kottmann


Publisher
No Starch Press
Year
2020
Tongue
English
Leaves
593
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Title Page
Copyright Page
About the Authors
BRIEF CONTENTS
CONTENTS IN DETAIL
FOREWORD
ACKNOWLEDGMENTS
INTRODUCTION
Who This Book Is For
What This Book Isn’t
Why Use Go for Hacking?
Why You Might Not Love Go
Chapter Overview
1 GO FUNDAMENTALS
Setting Up a Development Environment
Understanding Go Syntax
Summary
2 TCP, SCANNERS, AND PROXIES
Understanding the TCP Handshake
Bypassing Firewalls with Port Forwarding
Writing a TCP Scanner
Building a TCP Proxy
Summary
3 HTTP CLIENTS AND REMOTE INTERACTION WITH TOOLS
HTTP Fundamentals with Go
Building an HTTP Client That Interacts with Shodan
Interacting with Metasploit
Parsing Document Metadata with Bing Scraping
Summary
4 HTTP SERVERS, ROUTING, AND MIDDLEWARE
HTTP Server Basics
Credential Harvesting
Keylogging with the WebSocket API
Multiplexing Command-and-Control
Summary
5 EXPLOITING DNS
Writing DNS Clients
Writing DNS Servers
Summary
6 INTERACTING WITH SMB AND NTLM
The SMB Package
Understanding SMB
Guessing Passwords with SMB
Reusing Passwords with the Pass-the-Hash Technique
Recovering NTLM Passwords
Summary
7 ABUSING DATABASES AND FILESYSTEMS
Setting Up Databases with Docker
Connecting and Querying Databases in Go
Building a Database Miner
Pillaging a Filesystem
Summary
8 RAW PACKET PROCESSING
Setting Up Your Environment
Identifying Devices by Using the pcap Subpackage
Live Capturing and Filtering Results
Sniffing and Displaying Cleartext User Credentials
Port Scanning Through SYN-flood Protections
Summary
9 WRITING AND PORTING EXPLOIT CODE
Creating a Fuzzer
Porting Exploits to Go
Creating Shellcode in Go
Summary
10 GO PLUGINS AND EXTENDABLE TOOLS
Using Go’s Native Plug-in System
Building Plug-ins in Lua
Summary
11 IMPLEMENTING AND ATTACKING CRYPTOGRAPHY
Reviewing Basic Cryptography Concepts
Understanding the Standard Crypto Library
Exploring Hashing
Authenticating Messages
Encrypting Data
Brute-Forcing RC2
Summary
12 WINDOWS SYSTEM INTERACTION AND ANALYSIS
The Windows API’s OpenProcess() Function
The unsafe.Pointer and uintptr Types
Performing Process Injection with the syscall Package
The Portable Executable File
Using C with Go
Summary
13 HIDING DATA WITH STEGANOGRAPHY
Exploring the PNG Format
Reading Image Byte Data
Writing Image Byte Data to Implant a Payload
Encoding and Decoding Image Byte Data by Using XOR
Summary
Additional Exercises
14 BUILDING A COMMAND-AND-CONTROL RAT
Getting Started
Defining and Building the gRPC API
Creating the Server
Creating the Client Implant
Building the Admin Component
Running the RAT
Improving the RAT
Summary
Index


πŸ“œ SIMILAR VOLUMES


Black Hat Go: Go Programming for Hackers
✍ Tom Steele, Chris Patten and Dan Kottmann πŸ“‚ Library πŸ“… 2020 πŸ› No Starch Press 🌐 English

<b>Like the best-selling <i>Black Hat Python</i>, <i>Black Hat Go </i>explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.</b> <i

Black Hat Go: Go Programming For Hackers
✍ Tom Steele, Chris Patten, Dan Kottmann πŸ“‚ Library πŸ“… 2020 πŸ› No Starch Press 🌐 English

Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate t

Black Hat Go: Go Programming For Hackers
✍ Tom Steele, Chris Patten, Dan Kottmann πŸ“‚ Library πŸ“… 2020 πŸ› No Starch Press 🌐 English

Like the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset. Black Hat Go explores t

Black Hat Python: Python Programming for
✍ Justin Seitz; Tim Arnold πŸ“‚ Library πŸ“… 2021 πŸ› No Starch Press 🌐 English

<b>Fully-updated, second edition of this worldwide bestseller with over 100,000 copies sold.</b> When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In <i>Black Hat Python</i>, you'll explore the darker side of Python's capa

Black Hat Python: Python Programming for
✍ Justin Seitz πŸ“‚ Library πŸ“… 2014 πŸ› No Starch Press 🌐 English

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you’ll explore the darker side of Python’s