By Π‘ΡΠΈΠ» Π’Π°Π½Ρ , β¦
Π‘ΡΠΈΠ» Π’Π°Π½Ρ, ΠΠ°ΡΡΠ΅Π½ Π., ΠΠΎΡΡΠΌΠ°Π½Π½ Π. | 2022 | Π‘Π΅ΡΠΈΡ: ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΡΠ°
ΠΠ½ΠΈΠ³Π° 'Black Hat Go' ΡΠ°ΡΠΊΡΡΠ²Π°Π΅Ρ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΡΠ·ΡΠΊΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ Go Π² ΠΊΠΎΠ½ΡΠ΅ΠΊΡΡΠ΅ ΠΊΠΈΠ±Π΅ΡΠ±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ, ΠΏΠΎΠ΄ΡΠ΅ΡΠΊΠΈΠ²Π°Ρ Π΅Π³ΠΎ ΡΠ΅Π½Π½ΠΎΡΡΡ Π΄Π»Ρ Ρ Π°ΠΊΠ΅ΡΠΎΠ² Π±Π»Π°Π³ΠΎΠ΄Π°ΡΡ ΠΏΡΠΎΡΡΠΎΡΠ΅ ΠΈ ΡΡΡΠ΅ΠΊΡΠΈΠ²Π½ΠΎΡΡΠΈ. ΠΠ·Π΄Π°Π½ΠΈΠ΅ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»ΡΠ΅Ρ ΡΠΎΠ±ΠΎΠΉ ΡΠ±ΠΎΡΠ½ΠΈΠΊ ΠΏΡΠ°ΠΊΡΠΈΡΠ΅ΡΠΊΠΈΡ ΡΠ΅Ρ Π½ΠΈΠΊ Π΄Π»Ρ ΡΠΏΠ΅ΡΠΈΠ°Π»ΠΈΡΡΠΎΠ² ΠΏΠΎ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ, Π½Π°ΡΠ΅Π»Π΅Π½Π½ΡΡ Π½Π° ΡΠ΅ΡΡΠΈΡΠΎΠ²Π°Π½ΠΈΠ΅ ΡΠΈΡΡΠ΅ΠΌ, Π°Π²ΡΠΎΠΌΠ°ΡΠΈΠ·Π°ΡΠΈΡ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΎΠ² ΠΈ ΡΡΠΈΠ»Π΅Π½ΠΈΠ΅ Π·Π°ΡΠΈΡΡ. ΠΠ°ΡΠ΅ΡΠΈΠ°Π» ΠΎΡ Π²Π°ΡΡΠ²Π°Π΅Ρ ΠΊΠ°ΠΊ ΠΎΡΠ½ΠΎΠ²Ρ ΡΠΈΠ½ΡΠ°ΠΊΡΠΈΡΠ° Go, ΡΠ°ΠΊ ΠΈ ΠΏΡΠΎΠ΄Π²ΠΈΠ½ΡΡΡΠ΅ ΡΠ΅ΠΌΡ, Π²ΠΊΠ»ΡΡΠ°Ρ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΡ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΎΠ², ΡΠ°Π±ΠΎΡΡ Ρ ΡΠ΅ΡΠ΅Π²ΡΠΌΠΈ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»Π°ΠΌΠΈ ΠΈ ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΡΠΊΡΠΏΠ»ΠΎΠΉΡΠΎΠ².
Tanya Steel, K. Patten, D. Kottmann | 2022 | Series: Programmer's Library
'Black Hat Go' delves into the application of the Go programming language within cybersecurity, highlighting its appeal to hackers for its simplicity and efficiency. This book serves as a practical toolkit for security professionals and hackers, aiding in system testing, tool creation and automation, and threat mitigation. It begins with a foundational overview of Go's syntax and philosophy before progressing to practical examples for tool development. The content covers protocols like HTTP, DNS, and SMB, alongside pentesting tactics such as data exfiltration, packet sniffing, and exploit development.