官术网_书友最值得收藏!

What this book covers

Chapter 1, Introduction to Security with Go, covers the history of Go and discusses why Go is a good choice for security applications, how to set up a development environment, and run your first program. 

Chapter 2The Go Programming Language, presents the basics of programming with Go. It reviews the keywords and data types along with the notable features of Go. It also contains information for getting help and reading documentation.

Chapter 3Working with Files, helps you explore various ways of manipulating, reading, writing, and compressing files with Go.

Chapter 4Forensics, talks about basic file forensics, steganography, and network forensics techniques.

Chapter 5Packet Capturing and Injection, covers various aspects of packet capturing with the gopacket package. Topics include getting a list of network devices, capturing packets from a live network device, filtering packets, decoding packet layers, and sending custom packets.

Chapter 6, Cryptography, explains hashing, symmetric encryption such as AES, and asymmetric encryption such as RSA, digital signatures, verifying signatures, TLS connections, generating keys and certificates, and other cryptography packages.

Chapter 7Secure Shell (SSH), covers the Go SSH package, how to use the client to authenticate with a password and with a key pair. It also covers how to execute commands on a remote host using SSH and running an interactive shell.

Chapter 8Brute Force, includes examples of multiple brute force attack clients including HTTP basic authentication, HTML login form, SSH, MongoDB, MySQL, and PostgreSQL.

Chapter 9Web Applications, explains how to build secure web applications with secure cookies, sanitized output, security headers, logging, and other best practices. It also covers writing secure web clients that utilize client certificates, HTTP proxies, and SOCKS5 proxies such as Tor.

Chapter 10Web Scraping, discusses basic scraping techniques such as string matching, regular expressions, and fingerprinting. It also covers the goquery package, a powerful tool for extracting data from structured web pages.

Chapter 11Host Discovery and Enumeration, covers port scanning, banner grabbing, TCP proxies, simple socket server and client, fuzzing, and scanning networks for named hosts.

Chapter 12Social Engineering, provides examples for gathering intel via a JSON REST API such as Reddit, sending phishing emails with SMTP, and generating QR codes. It also covers Honeypots along with TCP and HTTP honeypot examples.

Chapter 13Post Exploitation, covers various post exploitation techniques such as cross-compiling bind shells, reverse bind shells, and web shells. It also provides examples of searching for writable files and modifying timestamp, ownership, and permissions.

Chapter 14Conclusions, is a recap of topics, showing you where you can go from here, and also has considerations for applying the techniques learned in this book.

主站蜘蛛池模板: 长沙市| 政和县| 大丰市| 周口市| 云霄县| 玉林市| 雅安市| 石嘴山市| 成安县| 纳雍县| 武定县| 灵川县| 安远县| 新巴尔虎左旗| 昭通市| 清新县| 瑞昌市| 新河县| 杭锦旗| 扎兰屯市| 贡觉县| 嘉鱼县| 鄂托克前旗| 崇明县| 重庆市| 斗六市| 衡水市| 二手房| 荥阳市| 岚皋县| 浦江县| 罗平县| 罗城| 临安市| 石泉县| 康乐县| 额济纳旗| 永春县| 汝南县| 云龙县| 石渠县|