Security with Go :: Explore the power of Golang to secure host, web, and cloud services.
Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2018.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic ... |
Beschreibung: | 1 online resource (334 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781788622257 1788622251 1788627911 9781788627917 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1022785890 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n|---||||| | ||
008 | 180210s2018 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d NLE |d MERUC |d OCLCQ |d IDB |d OCLCO |d OCLCF |d VT2 |d TEFOD |d OCLCQ |d OCLCO |d LVT |d C6I |d UKAHL |d OCLCQ |d N$T |d K6U |d OCLCO |d UKMGB |d OCLCO |d OCLCQ |d PSYSI |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBC1L5074 |2 bnb | ||
016 | 7 | |a 018754838 |2 Uk | |
020 | |a 9781788622257 |q (electronic bk.) | ||
020 | |a 1788622251 |q (electronic bk.) | ||
020 | |a 1788627911 | ||
020 | |a 9781788627917 | ||
024 | 3 | |a 9781788627917 | |
035 | |a (OCoLC)1022785890 | ||
037 | |a B09237 |b 01201872 | ||
037 | |a 0D343309-D4CC-466C-B8FF-7B65F0F49ACD |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.585 |b .L466 2018eb | |
082 | 7 | |a 004.6782 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Leon, John Daniel. | |
245 | 1 | 0 | |a Security with Go : |b Explore the power of Golang to secure host, web, and cloud services. |
260 | |a Birmingham : |b Packt Publishing, |c 2018. | ||
300 | |a 1 online resource (334 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
520 | |a Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic ... | ||
505 | 0 | |a Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Security with Go -- About Go -- Go language design -- The History of Go -- Adoption and community -- Common criticisms about Go -- The Go toolchain -- Go mascot -- Learning Go -- Why use Go? -- Why use Go for security? -- Why not use Python? -- Why not use Java? -- Why not use C++? -- Development environment -- Installing Go on other platforms -- Other Linux distributions -- Windows -- Mac -- Setting up Go -- Creating your workspace -- Setting up environment variables -- Editors -- Creating your first package -- Writing your first program -- Running the executable file -- Building the executable file -- Installing the executable file -- Formatting with go fmt -- Running Go examples -- Building a single Go file -- Running a single Go file -- Building multiple Go files -- Building a folder (package) -- Installing a program for use -- Summary -- Chapter 2: The Go Programming Language -- Go language specification -- The Go playground -- A tour of Go -- Keywords -- Notes about source code -- Comments -- Types -- Boolean -- Numeric -- Generic numbers -- Specific numbers -- Unsigned integers -- Signed integers -- Floating point numbers -- Other numeric types -- String -- Array -- Slice -- Struct -- Pointer -- Function -- Interface -- Map -- Channel -- Control structures -- if -- for -- range -- switch, case, fallthrough, and default -- goto -- Defer -- Packages -- Classes -- Inheritance -- Polymorphism -- Constructors -- Methods -- Operator overloading -- Goroutines -- Getting help and documentation -- Online Go documentation -- Offline Go documentation -- Summary -- Chapter 3: Working with Files -- File basics -- Creating an empty file -- Truncating a file -- Getting the file info -- Renaming a file -- Deleting a file. | |
505 | 8 | |a Opening and closing files -- Checking whether a file exists -- Checking read and write permissions -- Changing permissions, ownership, and timestamps -- Hard links and symlinks -- Reading and writing -- Copying a file -- Seeking positions in a file -- Writing bytes to a file -- Quickly writing to a file -- Buffered writer -- Reading up to n bytes from a file -- Reading exactly n bytes -- Reading at least n bytes -- Reading all bytes of a file -- Quickly reading whole files to memory -- Buffered reader -- Reading with a scanner -- Archives -- Archive (ZIP) files -- Extracting (unzip) archived files -- Compression -- Compressing a file -- Uncompressing a File -- Creating temporary files and directories -- Downloading a file over HTTP -- Summary -- Chapter 4: Forensics -- Files -- Getting file information -- Finding the largest files -- Finding recently modified files -- Reading the boot sector -- Steganography -- Generating an image with random noise -- Creating a ZIP archive -- Creating a steganographic image archive -- Detecting a ZIP archive in a JPEG image -- Network -- Looking up a hostname from an IP address -- Looking up IP addresses from a hostname -- Looking up MX records -- Looking up nameservers for a hostname -- Summary -- Chapter 5: Packet Capturing and Injection -- Prerequisites -- Installing libpcap and Git -- Installing libpcap on Ubuntu -- Installing libpcap on Windows -- Installing libpcap on macOS -- Installing gopacket -- Permission problems -- Getting a list of network devices -- Capturing packets -- Capturing with filters -- Saving to the pcap file -- Reading from a pcap file -- Decoding packet layers -- Creating a custom layer -- Converting bytes to and from packets -- Creating and sending packets -- Decoding packets faster -- Summary -- Chapter 6: Cryptography -- Hashing -- Hashing small files -- Hashing large files. | |
505 | 8 | |a Storing passwords securely -- Encryption -- Cryptographically secure pseudo-random number generator (CSPRNG) -- Symmetric encryption -- AES -- Asymmetric encryption -- Generating a public and private key pair -- Digitally signing a message -- Verifying a signature -- TLS -- Generating a self-signed certificate -- Creating a certificate signing request -- Signing a certificate request -- TLS server -- TLS client -- Other encryption packages -- OpenPGP -- Off The Record (OTR) messaging -- Summary -- Chapter 7: Secure Shell (SSH) -- Using the Go SSH client -- Authentication methods -- Authenticating with a password -- Authenticating with private key -- Verifying remote host -- Executing a command over SSH -- Starting an interactive shell -- Summary -- Chapter 8: Brute Force -- Brute forcing HTTP basic authentication -- Brute forcing the HTML login form -- Brute forcing SSH -- Brute forcing database login -- Summary -- Chapter 9: Web Applications -- HTTP server -- Simple HTTP servers -- HTTP basic auth -- Using HTTPS -- Creating secure cookies -- HTML escaping output -- Middleware with Negroni -- Logging requests -- Adding secure HTTP headers -- Serving static files -- Other best practices -- CSRF tokens -- Preventing user enumeration and abuse -- Registration -- Login -- Resetting the password -- User profiles -- Preventing LFI and RFI abuse -- Contaminated files -- HTTP client -- The basic HTTP request -- Using the client SSL certificate -- Using a proxy -- Using system proxy -- Using a specific HTTP proxy -- Using a SOCKS5 proxy (Tor) -- Summary -- Chapter 10: Web Scraping -- Web scraping fundamentals -- Finding strings in HTTP responses with the strings package -- Using regular expressions to find email addresses in a page -- Extracting HTTP headers from an HTTP response -- Setting cookies with an HTTP client -- Finding HTML comments in a web page. | |
505 | 8 | |a Finding unlisted files on a web server -- Changing the user agent of a request -- Fingerprinting web application technology stacks -- Fingerprinting based on HTTP response headers -- Fingerprinting web applications -- How to prevent fingerprinting of your applications -- Using the goquery package for web scraping -- Listing all hyperlinks in a page -- Finding documents in a web page -- Listing page title and headings -- Crawling pages on the site that store the most common words -- Printing a list of external JavaScript files in a page -- Depth-first crawling -- Breadth-first crawling -- How to protect against web scraping -- Summary -- Chapter 11: Host Discovery and Enumeration -- TCP and UDP sockets -- Creating a server -- Creating a client -- Port scanning -- Grabbing a banner from a service -- Creating a TCP proxy -- Finding named hosts on a network -- Fuzzing a network service -- Summary -- Chapter 12: Social Engineering -- Gathering intel via JSON REST API -- Sending phishing emails with SMTP -- Generating QR codes -- Base64 encoding data -- Honeypots -- TCP honeypot -- The TCP testing tool -- HTTP POST form login honeypot -- HTTP form field honeypots -- Sandboxing -- Summary -- Chapter 13: Post Exploitation -- Cross compiling -- Creating bind shells -- Creating reverse bind shells -- Creating web shells -- Finding writable files -- Changing file timestamp -- Changing file permissions -- Changing file ownership -- Summary -- Chapter 14: Conclusions -- Recapping the topics you have learned -- More thoughts on the usage of Go -- What I hope you take away from the book -- Be aware of legal, ethical, and technical boundaries -- Where to go from here -- Getting help and learning more -- Another Book You May Enjoy -- Leave a review -- let other readers know what you think -- Index. | |
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Cloud computing |x Security measures. | |
650 | 0 | |a Mobile computing |x Security measures. | |
650 | 0 | |a Mobile communication systems |x Security measures. | |
650 | 0 | |a Go (Computer program language) |0 http://id.loc.gov/authorities/subjects/sh2012000746 | |
650 | 6 | |a Infonuagique |x Sécurité |x Mesures. | |
650 | 6 | |a Informatique mobile |x Sécurité |x Mesures. | |
650 | 6 | |a Radiocommunications mobiles |x Sécurité |x Mesures. | |
650 | 6 | |a Go (Langage de programmation) | |
650 | 7 | |a Coding theory & cryptology. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Data encryption. |2 bicssc | |
650 | 7 | |a Network security. |2 bicssc | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Computers |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a Go (Computer program language) |2 fast | |
758 | |i has work: |a Security with Go (Text) |1 https://id.oclc.org/worldcat/entity/E39PD3trRFj4KhggRJFCBjQxwC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Leon, John Daniel. |t Security with Go : Explore the power of Golang to secure host, web, and cloud services. |d Birmingham : Packt Publishing, ©2018 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1703785 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1703785 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n BDZ0036190731 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL5259459 | ||
938 | |a EBSCOhost |b EBSC |n 1703785 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1022785890 |
---|---|
_version_ | 1826942173744988160 |
adam_text | |
any_adam_object | |
author | Leon, John Daniel |
author_facet | Leon, John Daniel |
author_role | |
author_sort | Leon, John Daniel |
author_variant | j d l jd jdl |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.585 .L466 2018eb |
callnumber-search | QA76.585 .L466 2018eb |
callnumber-sort | QA 276.585 L466 42018EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Security with Go -- About Go -- Go language design -- The History of Go -- Adoption and community -- Common criticisms about Go -- The Go toolchain -- Go mascot -- Learning Go -- Why use Go? -- Why use Go for security? -- Why not use Python? -- Why not use Java? -- Why not use C++? -- Development environment -- Installing Go on other platforms -- Other Linux distributions -- Windows -- Mac -- Setting up Go -- Creating your workspace -- Setting up environment variables -- Editors -- Creating your first package -- Writing your first program -- Running the executable file -- Building the executable file -- Installing the executable file -- Formatting with go fmt -- Running Go examples -- Building a single Go file -- Running a single Go file -- Building multiple Go files -- Building a folder (package) -- Installing a program for use -- Summary -- Chapter 2: The Go Programming Language -- Go language specification -- The Go playground -- A tour of Go -- Keywords -- Notes about source code -- Comments -- Types -- Boolean -- Numeric -- Generic numbers -- Specific numbers -- Unsigned integers -- Signed integers -- Floating point numbers -- Other numeric types -- String -- Array -- Slice -- Struct -- Pointer -- Function -- Interface -- Map -- Channel -- Control structures -- if -- for -- range -- switch, case, fallthrough, and default -- goto -- Defer -- Packages -- Classes -- Inheritance -- Polymorphism -- Constructors -- Methods -- Operator overloading -- Goroutines -- Getting help and documentation -- Online Go documentation -- Offline Go documentation -- Summary -- Chapter 3: Working with Files -- File basics -- Creating an empty file -- Truncating a file -- Getting the file info -- Renaming a file -- Deleting a file. Opening and closing files -- Checking whether a file exists -- Checking read and write permissions -- Changing permissions, ownership, and timestamps -- Hard links and symlinks -- Reading and writing -- Copying a file -- Seeking positions in a file -- Writing bytes to a file -- Quickly writing to a file -- Buffered writer -- Reading up to n bytes from a file -- Reading exactly n bytes -- Reading at least n bytes -- Reading all bytes of a file -- Quickly reading whole files to memory -- Buffered reader -- Reading with a scanner -- Archives -- Archive (ZIP) files -- Extracting (unzip) archived files -- Compression -- Compressing a file -- Uncompressing a File -- Creating temporary files and directories -- Downloading a file over HTTP -- Summary -- Chapter 4: Forensics -- Files -- Getting file information -- Finding the largest files -- Finding recently modified files -- Reading the boot sector -- Steganography -- Generating an image with random noise -- Creating a ZIP archive -- Creating a steganographic image archive -- Detecting a ZIP archive in a JPEG image -- Network -- Looking up a hostname from an IP address -- Looking up IP addresses from a hostname -- Looking up MX records -- Looking up nameservers for a hostname -- Summary -- Chapter 5: Packet Capturing and Injection -- Prerequisites -- Installing libpcap and Git -- Installing libpcap on Ubuntu -- Installing libpcap on Windows -- Installing libpcap on macOS -- Installing gopacket -- Permission problems -- Getting a list of network devices -- Capturing packets -- Capturing with filters -- Saving to the pcap file -- Reading from a pcap file -- Decoding packet layers -- Creating a custom layer -- Converting bytes to and from packets -- Creating and sending packets -- Decoding packets faster -- Summary -- Chapter 6: Cryptography -- Hashing -- Hashing small files -- Hashing large files. Storing passwords securely -- Encryption -- Cryptographically secure pseudo-random number generator (CSPRNG) -- Symmetric encryption -- AES -- Asymmetric encryption -- Generating a public and private key pair -- Digitally signing a message -- Verifying a signature -- TLS -- Generating a self-signed certificate -- Creating a certificate signing request -- Signing a certificate request -- TLS server -- TLS client -- Other encryption packages -- OpenPGP -- Off The Record (OTR) messaging -- Summary -- Chapter 7: Secure Shell (SSH) -- Using the Go SSH client -- Authentication methods -- Authenticating with a password -- Authenticating with private key -- Verifying remote host -- Executing a command over SSH -- Starting an interactive shell -- Summary -- Chapter 8: Brute Force -- Brute forcing HTTP basic authentication -- Brute forcing the HTML login form -- Brute forcing SSH -- Brute forcing database login -- Summary -- Chapter 9: Web Applications -- HTTP server -- Simple HTTP servers -- HTTP basic auth -- Using HTTPS -- Creating secure cookies -- HTML escaping output -- Middleware with Negroni -- Logging requests -- Adding secure HTTP headers -- Serving static files -- Other best practices -- CSRF tokens -- Preventing user enumeration and abuse -- Registration -- Login -- Resetting the password -- User profiles -- Preventing LFI and RFI abuse -- Contaminated files -- HTTP client -- The basic HTTP request -- Using the client SSL certificate -- Using a proxy -- Using system proxy -- Using a specific HTTP proxy -- Using a SOCKS5 proxy (Tor) -- Summary -- Chapter 10: Web Scraping -- Web scraping fundamentals -- Finding strings in HTTP responses with the strings package -- Using regular expressions to find email addresses in a page -- Extracting HTTP headers from an HTTP response -- Setting cookies with an HTTP client -- Finding HTML comments in a web page. Finding unlisted files on a web server -- Changing the user agent of a request -- Fingerprinting web application technology stacks -- Fingerprinting based on HTTP response headers -- Fingerprinting web applications -- How to prevent fingerprinting of your applications -- Using the goquery package for web scraping -- Listing all hyperlinks in a page -- Finding documents in a web page -- Listing page title and headings -- Crawling pages on the site that store the most common words -- Printing a list of external JavaScript files in a page -- Depth-first crawling -- Breadth-first crawling -- How to protect against web scraping -- Summary -- Chapter 11: Host Discovery and Enumeration -- TCP and UDP sockets -- Creating a server -- Creating a client -- Port scanning -- Grabbing a banner from a service -- Creating a TCP proxy -- Finding named hosts on a network -- Fuzzing a network service -- Summary -- Chapter 12: Social Engineering -- Gathering intel via JSON REST API -- Sending phishing emails with SMTP -- Generating QR codes -- Base64 encoding data -- Honeypots -- TCP honeypot -- The TCP testing tool -- HTTP POST form login honeypot -- HTTP form field honeypots -- Sandboxing -- Summary -- Chapter 13: Post Exploitation -- Cross compiling -- Creating bind shells -- Creating reverse bind shells -- Creating web shells -- Finding writable files -- Changing file timestamp -- Changing file permissions -- Changing file ownership -- Summary -- Chapter 14: Conclusions -- Recapping the topics you have learned -- More thoughts on the usage of Go -- What I hope you take away from the book -- Be aware of legal, ethical, and technical boundaries -- Where to go from here -- Getting help and learning more -- Another Book You May Enjoy -- Leave a review -- let other readers know what you think -- Index. |
ctrlnum | (OCoLC)1022785890 |
dewey-full | 004.6782 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6782 |
dewey-search | 004.6782 |
dewey-sort | 14.6782 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10740cam a2200709Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1022785890</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|---|||||</controlfield><controlfield tag="008">180210s2018 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">NLE</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VT2</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LVT</subfield><subfield code="d">C6I</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">PSYSI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC1L5074</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018754838</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788622257</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788622251</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788627911</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788627917</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781788627917</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1022785890</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">B09237</subfield><subfield code="b">01201872</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">0D343309-D4CC-466C-B8FF-7B65F0F49ACD</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.585</subfield><subfield code="b">.L466 2018eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.6782</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Leon, John Daniel.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security with Go :</subfield><subfield code="b">Explore the power of Golang to secure host, web, and cloud services.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2018.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (334 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic ...</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Security with Go -- About Go -- Go language design -- The History of Go -- Adoption and community -- Common criticisms about Go -- The Go toolchain -- Go mascot -- Learning Go -- Why use Go? -- Why use Go for security? -- Why not use Python? -- Why not use Java? -- Why not use C++? -- Development environment -- Installing Go on other platforms -- Other Linux distributions -- Windows -- Mac -- Setting up Go -- Creating your workspace -- Setting up environment variables -- Editors -- Creating your first package -- Writing your first program -- Running the executable file -- Building the executable file -- Installing the executable file -- Formatting with go fmt -- Running Go examples -- Building a single Go file -- Running a single Go file -- Building multiple Go files -- Building a folder (package) -- Installing a program for use -- Summary -- Chapter 2: The Go Programming Language -- Go language specification -- The Go playground -- A tour of Go -- Keywords -- Notes about source code -- Comments -- Types -- Boolean -- Numeric -- Generic numbers -- Specific numbers -- Unsigned integers -- Signed integers -- Floating point numbers -- Other numeric types -- String -- Array -- Slice -- Struct -- Pointer -- Function -- Interface -- Map -- Channel -- Control structures -- if -- for -- range -- switch, case, fallthrough, and default -- goto -- Defer -- Packages -- Classes -- Inheritance -- Polymorphism -- Constructors -- Methods -- Operator overloading -- Goroutines -- Getting help and documentation -- Online Go documentation -- Offline Go documentation -- Summary -- Chapter 3: Working with Files -- File basics -- Creating an empty file -- Truncating a file -- Getting the file info -- Renaming a file -- Deleting a file.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Opening and closing files -- Checking whether a file exists -- Checking read and write permissions -- Changing permissions, ownership, and timestamps -- Hard links and symlinks -- Reading and writing -- Copying a file -- Seeking positions in a file -- Writing bytes to a file -- Quickly writing to a file -- Buffered writer -- Reading up to n bytes from a file -- Reading exactly n bytes -- Reading at least n bytes -- Reading all bytes of a file -- Quickly reading whole files to memory -- Buffered reader -- Reading with a scanner -- Archives -- Archive (ZIP) files -- Extracting (unzip) archived files -- Compression -- Compressing a file -- Uncompressing a File -- Creating temporary files and directories -- Downloading a file over HTTP -- Summary -- Chapter 4: Forensics -- Files -- Getting file information -- Finding the largest files -- Finding recently modified files -- Reading the boot sector -- Steganography -- Generating an image with random noise -- Creating a ZIP archive -- Creating a steganographic image archive -- Detecting a ZIP archive in a JPEG image -- Network -- Looking up a hostname from an IP address -- Looking up IP addresses from a hostname -- Looking up MX records -- Looking up nameservers for a hostname -- Summary -- Chapter 5: Packet Capturing and Injection -- Prerequisites -- Installing libpcap and Git -- Installing libpcap on Ubuntu -- Installing libpcap on Windows -- Installing libpcap on macOS -- Installing gopacket -- Permission problems -- Getting a list of network devices -- Capturing packets -- Capturing with filters -- Saving to the pcap file -- Reading from a pcap file -- Decoding packet layers -- Creating a custom layer -- Converting bytes to and from packets -- Creating and sending packets -- Decoding packets faster -- Summary -- Chapter 6: Cryptography -- Hashing -- Hashing small files -- Hashing large files.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Storing passwords securely -- Encryption -- Cryptographically secure pseudo-random number generator (CSPRNG) -- Symmetric encryption -- AES -- Asymmetric encryption -- Generating a public and private key pair -- Digitally signing a message -- Verifying a signature -- TLS -- Generating a self-signed certificate -- Creating a certificate signing request -- Signing a certificate request -- TLS server -- TLS client -- Other encryption packages -- OpenPGP -- Off The Record (OTR) messaging -- Summary -- Chapter 7: Secure Shell (SSH) -- Using the Go SSH client -- Authentication methods -- Authenticating with a password -- Authenticating with private key -- Verifying remote host -- Executing a command over SSH -- Starting an interactive shell -- Summary -- Chapter 8: Brute Force -- Brute forcing HTTP basic authentication -- Brute forcing the HTML login form -- Brute forcing SSH -- Brute forcing database login -- Summary -- Chapter 9: Web Applications -- HTTP server -- Simple HTTP servers -- HTTP basic auth -- Using HTTPS -- Creating secure cookies -- HTML escaping output -- Middleware with Negroni -- Logging requests -- Adding secure HTTP headers -- Serving static files -- Other best practices -- CSRF tokens -- Preventing user enumeration and abuse -- Registration -- Login -- Resetting the password -- User profiles -- Preventing LFI and RFI abuse -- Contaminated files -- HTTP client -- The basic HTTP request -- Using the client SSL certificate -- Using a proxy -- Using system proxy -- Using a specific HTTP proxy -- Using a SOCKS5 proxy (Tor) -- Summary -- Chapter 10: Web Scraping -- Web scraping fundamentals -- Finding strings in HTTP responses with the strings package -- Using regular expressions to find email addresses in a page -- Extracting HTTP headers from an HTTP response -- Setting cookies with an HTTP client -- Finding HTML comments in a web page.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Finding unlisted files on a web server -- Changing the user agent of a request -- Fingerprinting web application technology stacks -- Fingerprinting based on HTTP response headers -- Fingerprinting web applications -- How to prevent fingerprinting of your applications -- Using the goquery package for web scraping -- Listing all hyperlinks in a page -- Finding documents in a web page -- Listing page title and headings -- Crawling pages on the site that store the most common words -- Printing a list of external JavaScript files in a page -- Depth-first crawling -- Breadth-first crawling -- How to protect against web scraping -- Summary -- Chapter 11: Host Discovery and Enumeration -- TCP and UDP sockets -- Creating a server -- Creating a client -- Port scanning -- Grabbing a banner from a service -- Creating a TCP proxy -- Finding named hosts on a network -- Fuzzing a network service -- Summary -- Chapter 12: Social Engineering -- Gathering intel via JSON REST API -- Sending phishing emails with SMTP -- Generating QR codes -- Base64 encoding data -- Honeypots -- TCP honeypot -- The TCP testing tool -- HTTP POST form login honeypot -- HTTP form field honeypots -- Sandboxing -- Summary -- Chapter 13: Post Exploitation -- Cross compiling -- Creating bind shells -- Creating reverse bind shells -- Creating web shells -- Finding writable files -- Changing file timestamp -- Changing file permissions -- Changing file ownership -- Summary -- Chapter 14: Conclusions -- Recapping the topics you have learned -- More thoughts on the usage of Go -- What I hope you take away from the book -- Be aware of legal, ethical, and technical boundaries -- Where to go from here -- Getting help and learning more -- Another Book You May Enjoy -- Leave a review -- let other readers know what you think -- Index.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cloud computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Go (Computer program language)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2012000746</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Infonuagique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Informatique mobile</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Radiocommunications mobiles</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Go (Langage de programmation)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coding theory & cryptology.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Network security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Go (Computer program language)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security with Go (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PD3trRFj4KhggRJFCBjQxwC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Leon, John Daniel.</subfield><subfield code="t">Security with Go : Explore the power of Golang to secure host, web, and cloud services.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2018</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1703785</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1703785</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">BDZ0036190731</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5259459</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1703785</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1022785890 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:23:48Z |
institution | BVB |
isbn | 9781788622257 1788622251 1788627911 9781788627917 |
language | English |
oclc_num | 1022785890 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (334 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Leon, John Daniel. Security with Go : Explore the power of Golang to secure host, web, and cloud services. Birmingham : Packt Publishing, 2018. 1 online resource (334 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. Since Go has become enormously popular, Go's obvious advantages, like stability, speed and simplicity, make it a first class choice to develop security-oriented scripts and applications. Security with Go is a classical title for security developers, with its emphasis on Go. Based on John Leon's first mover experience, He starts out basic ... Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Security with Go -- About Go -- Go language design -- The History of Go -- Adoption and community -- Common criticisms about Go -- The Go toolchain -- Go mascot -- Learning Go -- Why use Go? -- Why use Go for security? -- Why not use Python? -- Why not use Java? -- Why not use C++? -- Development environment -- Installing Go on other platforms -- Other Linux distributions -- Windows -- Mac -- Setting up Go -- Creating your workspace -- Setting up environment variables -- Editors -- Creating your first package -- Writing your first program -- Running the executable file -- Building the executable file -- Installing the executable file -- Formatting with go fmt -- Running Go examples -- Building a single Go file -- Running a single Go file -- Building multiple Go files -- Building a folder (package) -- Installing a program for use -- Summary -- Chapter 2: The Go Programming Language -- Go language specification -- The Go playground -- A tour of Go -- Keywords -- Notes about source code -- Comments -- Types -- Boolean -- Numeric -- Generic numbers -- Specific numbers -- Unsigned integers -- Signed integers -- Floating point numbers -- Other numeric types -- String -- Array -- Slice -- Struct -- Pointer -- Function -- Interface -- Map -- Channel -- Control structures -- if -- for -- range -- switch, case, fallthrough, and default -- goto -- Defer -- Packages -- Classes -- Inheritance -- Polymorphism -- Constructors -- Methods -- Operator overloading -- Goroutines -- Getting help and documentation -- Online Go documentation -- Offline Go documentation -- Summary -- Chapter 3: Working with Files -- File basics -- Creating an empty file -- Truncating a file -- Getting the file info -- Renaming a file -- Deleting a file. Opening and closing files -- Checking whether a file exists -- Checking read and write permissions -- Changing permissions, ownership, and timestamps -- Hard links and symlinks -- Reading and writing -- Copying a file -- Seeking positions in a file -- Writing bytes to a file -- Quickly writing to a file -- Buffered writer -- Reading up to n bytes from a file -- Reading exactly n bytes -- Reading at least n bytes -- Reading all bytes of a file -- Quickly reading whole files to memory -- Buffered reader -- Reading with a scanner -- Archives -- Archive (ZIP) files -- Extracting (unzip) archived files -- Compression -- Compressing a file -- Uncompressing a File -- Creating temporary files and directories -- Downloading a file over HTTP -- Summary -- Chapter 4: Forensics -- Files -- Getting file information -- Finding the largest files -- Finding recently modified files -- Reading the boot sector -- Steganography -- Generating an image with random noise -- Creating a ZIP archive -- Creating a steganographic image archive -- Detecting a ZIP archive in a JPEG image -- Network -- Looking up a hostname from an IP address -- Looking up IP addresses from a hostname -- Looking up MX records -- Looking up nameservers for a hostname -- Summary -- Chapter 5: Packet Capturing and Injection -- Prerequisites -- Installing libpcap and Git -- Installing libpcap on Ubuntu -- Installing libpcap on Windows -- Installing libpcap on macOS -- Installing gopacket -- Permission problems -- Getting a list of network devices -- Capturing packets -- Capturing with filters -- Saving to the pcap file -- Reading from a pcap file -- Decoding packet layers -- Creating a custom layer -- Converting bytes to and from packets -- Creating and sending packets -- Decoding packets faster -- Summary -- Chapter 6: Cryptography -- Hashing -- Hashing small files -- Hashing large files. Storing passwords securely -- Encryption -- Cryptographically secure pseudo-random number generator (CSPRNG) -- Symmetric encryption -- AES -- Asymmetric encryption -- Generating a public and private key pair -- Digitally signing a message -- Verifying a signature -- TLS -- Generating a self-signed certificate -- Creating a certificate signing request -- Signing a certificate request -- TLS server -- TLS client -- Other encryption packages -- OpenPGP -- Off The Record (OTR) messaging -- Summary -- Chapter 7: Secure Shell (SSH) -- Using the Go SSH client -- Authentication methods -- Authenticating with a password -- Authenticating with private key -- Verifying remote host -- Executing a command over SSH -- Starting an interactive shell -- Summary -- Chapter 8: Brute Force -- Brute forcing HTTP basic authentication -- Brute forcing the HTML login form -- Brute forcing SSH -- Brute forcing database login -- Summary -- Chapter 9: Web Applications -- HTTP server -- Simple HTTP servers -- HTTP basic auth -- Using HTTPS -- Creating secure cookies -- HTML escaping output -- Middleware with Negroni -- Logging requests -- Adding secure HTTP headers -- Serving static files -- Other best practices -- CSRF tokens -- Preventing user enumeration and abuse -- Registration -- Login -- Resetting the password -- User profiles -- Preventing LFI and RFI abuse -- Contaminated files -- HTTP client -- The basic HTTP request -- Using the client SSL certificate -- Using a proxy -- Using system proxy -- Using a specific HTTP proxy -- Using a SOCKS5 proxy (Tor) -- Summary -- Chapter 10: Web Scraping -- Web scraping fundamentals -- Finding strings in HTTP responses with the strings package -- Using regular expressions to find email addresses in a page -- Extracting HTTP headers from an HTTP response -- Setting cookies with an HTTP client -- Finding HTML comments in a web page. Finding unlisted files on a web server -- Changing the user agent of a request -- Fingerprinting web application technology stacks -- Fingerprinting based on HTTP response headers -- Fingerprinting web applications -- How to prevent fingerprinting of your applications -- Using the goquery package for web scraping -- Listing all hyperlinks in a page -- Finding documents in a web page -- Listing page title and headings -- Crawling pages on the site that store the most common words -- Printing a list of external JavaScript files in a page -- Depth-first crawling -- Breadth-first crawling -- How to protect against web scraping -- Summary -- Chapter 11: Host Discovery and Enumeration -- TCP and UDP sockets -- Creating a server -- Creating a client -- Port scanning -- Grabbing a banner from a service -- Creating a TCP proxy -- Finding named hosts on a network -- Fuzzing a network service -- Summary -- Chapter 12: Social Engineering -- Gathering intel via JSON REST API -- Sending phishing emails with SMTP -- Generating QR codes -- Base64 encoding data -- Honeypots -- TCP honeypot -- The TCP testing tool -- HTTP POST form login honeypot -- HTTP form field honeypots -- Sandboxing -- Summary -- Chapter 13: Post Exploitation -- Cross compiling -- Creating bind shells -- Creating reverse bind shells -- Creating web shells -- Finding writable files -- Changing file timestamp -- Changing file permissions -- Changing file ownership -- Summary -- Chapter 14: Conclusions -- Recapping the topics you have learned -- More thoughts on the usage of Go -- What I hope you take away from the book -- Be aware of legal, ethical, and technical boundaries -- Where to go from here -- Getting help and learning more -- Another Book You May Enjoy -- Leave a review -- let other readers know what you think -- Index. Includes bibliographical references. Cloud computing Security measures. Mobile computing Security measures. Mobile communication systems Security measures. Go (Computer program language) http://id.loc.gov/authorities/subjects/sh2012000746 Infonuagique Sécurité Mesures. Informatique mobile Sécurité Mesures. Radiocommunications mobiles Sécurité Mesures. Go (Langage de programmation) Coding theory & cryptology. bicssc Computer security. bicssc Data encryption. bicssc Network security. bicssc Computers Security General. bisacsh Computers Security Cryptography. bisacsh Computers Networking Security. bisacsh Go (Computer program language) fast has work: Security with Go (Text) https://id.oclc.org/worldcat/entity/E39PD3trRFj4KhggRJFCBjQxwC https://id.oclc.org/worldcat/ontology/hasWork Print version: Leon, John Daniel. Security with Go : Explore the power of Golang to secure host, web, and cloud services. Birmingham : Packt Publishing, ©2018 |
spellingShingle | Leon, John Daniel Security with Go : Explore the power of Golang to secure host, web, and cloud services. Cover -- Copyright and Credits -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Introduction to Security with Go -- About Go -- Go language design -- The History of Go -- Adoption and community -- Common criticisms about Go -- The Go toolchain -- Go mascot -- Learning Go -- Why use Go? -- Why use Go for security? -- Why not use Python? -- Why not use Java? -- Why not use C++? -- Development environment -- Installing Go on other platforms -- Other Linux distributions -- Windows -- Mac -- Setting up Go -- Creating your workspace -- Setting up environment variables -- Editors -- Creating your first package -- Writing your first program -- Running the executable file -- Building the executable file -- Installing the executable file -- Formatting with go fmt -- Running Go examples -- Building a single Go file -- Running a single Go file -- Building multiple Go files -- Building a folder (package) -- Installing a program for use -- Summary -- Chapter 2: The Go Programming Language -- Go language specification -- The Go playground -- A tour of Go -- Keywords -- Notes about source code -- Comments -- Types -- Boolean -- Numeric -- Generic numbers -- Specific numbers -- Unsigned integers -- Signed integers -- Floating point numbers -- Other numeric types -- String -- Array -- Slice -- Struct -- Pointer -- Function -- Interface -- Map -- Channel -- Control structures -- if -- for -- range -- switch, case, fallthrough, and default -- goto -- Defer -- Packages -- Classes -- Inheritance -- Polymorphism -- Constructors -- Methods -- Operator overloading -- Goroutines -- Getting help and documentation -- Online Go documentation -- Offline Go documentation -- Summary -- Chapter 3: Working with Files -- File basics -- Creating an empty file -- Truncating a file -- Getting the file info -- Renaming a file -- Deleting a file. Opening and closing files -- Checking whether a file exists -- Checking read and write permissions -- Changing permissions, ownership, and timestamps -- Hard links and symlinks -- Reading and writing -- Copying a file -- Seeking positions in a file -- Writing bytes to a file -- Quickly writing to a file -- Buffered writer -- Reading up to n bytes from a file -- Reading exactly n bytes -- Reading at least n bytes -- Reading all bytes of a file -- Quickly reading whole files to memory -- Buffered reader -- Reading with a scanner -- Archives -- Archive (ZIP) files -- Extracting (unzip) archived files -- Compression -- Compressing a file -- Uncompressing a File -- Creating temporary files and directories -- Downloading a file over HTTP -- Summary -- Chapter 4: Forensics -- Files -- Getting file information -- Finding the largest files -- Finding recently modified files -- Reading the boot sector -- Steganography -- Generating an image with random noise -- Creating a ZIP archive -- Creating a steganographic image archive -- Detecting a ZIP archive in a JPEG image -- Network -- Looking up a hostname from an IP address -- Looking up IP addresses from a hostname -- Looking up MX records -- Looking up nameservers for a hostname -- Summary -- Chapter 5: Packet Capturing and Injection -- Prerequisites -- Installing libpcap and Git -- Installing libpcap on Ubuntu -- Installing libpcap on Windows -- Installing libpcap on macOS -- Installing gopacket -- Permission problems -- Getting a list of network devices -- Capturing packets -- Capturing with filters -- Saving to the pcap file -- Reading from a pcap file -- Decoding packet layers -- Creating a custom layer -- Converting bytes to and from packets -- Creating and sending packets -- Decoding packets faster -- Summary -- Chapter 6: Cryptography -- Hashing -- Hashing small files -- Hashing large files. Storing passwords securely -- Encryption -- Cryptographically secure pseudo-random number generator (CSPRNG) -- Symmetric encryption -- AES -- Asymmetric encryption -- Generating a public and private key pair -- Digitally signing a message -- Verifying a signature -- TLS -- Generating a self-signed certificate -- Creating a certificate signing request -- Signing a certificate request -- TLS server -- TLS client -- Other encryption packages -- OpenPGP -- Off The Record (OTR) messaging -- Summary -- Chapter 7: Secure Shell (SSH) -- Using the Go SSH client -- Authentication methods -- Authenticating with a password -- Authenticating with private key -- Verifying remote host -- Executing a command over SSH -- Starting an interactive shell -- Summary -- Chapter 8: Brute Force -- Brute forcing HTTP basic authentication -- Brute forcing the HTML login form -- Brute forcing SSH -- Brute forcing database login -- Summary -- Chapter 9: Web Applications -- HTTP server -- Simple HTTP servers -- HTTP basic auth -- Using HTTPS -- Creating secure cookies -- HTML escaping output -- Middleware with Negroni -- Logging requests -- Adding secure HTTP headers -- Serving static files -- Other best practices -- CSRF tokens -- Preventing user enumeration and abuse -- Registration -- Login -- Resetting the password -- User profiles -- Preventing LFI and RFI abuse -- Contaminated files -- HTTP client -- The basic HTTP request -- Using the client SSL certificate -- Using a proxy -- Using system proxy -- Using a specific HTTP proxy -- Using a SOCKS5 proxy (Tor) -- Summary -- Chapter 10: Web Scraping -- Web scraping fundamentals -- Finding strings in HTTP responses with the strings package -- Using regular expressions to find email addresses in a page -- Extracting HTTP headers from an HTTP response -- Setting cookies with an HTTP client -- Finding HTML comments in a web page. Finding unlisted files on a web server -- Changing the user agent of a request -- Fingerprinting web application technology stacks -- Fingerprinting based on HTTP response headers -- Fingerprinting web applications -- How to prevent fingerprinting of your applications -- Using the goquery package for web scraping -- Listing all hyperlinks in a page -- Finding documents in a web page -- Listing page title and headings -- Crawling pages on the site that store the most common words -- Printing a list of external JavaScript files in a page -- Depth-first crawling -- Breadth-first crawling -- How to protect against web scraping -- Summary -- Chapter 11: Host Discovery and Enumeration -- TCP and UDP sockets -- Creating a server -- Creating a client -- Port scanning -- Grabbing a banner from a service -- Creating a TCP proxy -- Finding named hosts on a network -- Fuzzing a network service -- Summary -- Chapter 12: Social Engineering -- Gathering intel via JSON REST API -- Sending phishing emails with SMTP -- Generating QR codes -- Base64 encoding data -- Honeypots -- TCP honeypot -- The TCP testing tool -- HTTP POST form login honeypot -- HTTP form field honeypots -- Sandboxing -- Summary -- Chapter 13: Post Exploitation -- Cross compiling -- Creating bind shells -- Creating reverse bind shells -- Creating web shells -- Finding writable files -- Changing file timestamp -- Changing file permissions -- Changing file ownership -- Summary -- Chapter 14: Conclusions -- Recapping the topics you have learned -- More thoughts on the usage of Go -- What I hope you take away from the book -- Be aware of legal, ethical, and technical boundaries -- Where to go from here -- Getting help and learning more -- Another Book You May Enjoy -- Leave a review -- let other readers know what you think -- Index. Cloud computing Security measures. Mobile computing Security measures. Mobile communication systems Security measures. Go (Computer program language) http://id.loc.gov/authorities/subjects/sh2012000746 Infonuagique Sécurité Mesures. Informatique mobile Sécurité Mesures. Radiocommunications mobiles Sécurité Mesures. Go (Langage de programmation) Coding theory & cryptology. bicssc Computer security. bicssc Data encryption. bicssc Network security. bicssc Computers Security General. bisacsh Computers Security Cryptography. bisacsh Computers Networking Security. bisacsh Go (Computer program language) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2012000746 |
title | Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
title_auth | Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
title_exact_search | Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
title_full | Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
title_fullStr | Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
title_full_unstemmed | Security with Go : Explore the power of Golang to secure host, web, and cloud services. |
title_short | Security with Go : |
title_sort | security with go explore the power of golang to secure host web and cloud services |
title_sub | Explore the power of Golang to secure host, web, and cloud services. |
topic | Cloud computing Security measures. Mobile computing Security measures. Mobile communication systems Security measures. Go (Computer program language) http://id.loc.gov/authorities/subjects/sh2012000746 Infonuagique Sécurité Mesures. Informatique mobile Sécurité Mesures. Radiocommunications mobiles Sécurité Mesures. Go (Langage de programmation) Coding theory & cryptology. bicssc Computer security. bicssc Data encryption. bicssc Network security. bicssc Computers Security General. bisacsh Computers Security Cryptography. bisacsh Computers Networking Security. bisacsh Go (Computer program language) fast |
topic_facet | Cloud computing Security measures. Mobile computing Security measures. Mobile communication systems Security measures. Go (Computer program language) Infonuagique Sécurité Mesures. Informatique mobile Sécurité Mesures. Radiocommunications mobiles Sécurité Mesures. Go (Langage de programmation) Coding theory & cryptology. Computer security. Data encryption. Network security. Computers Security General. Computers Security Cryptography. Computers Networking Security. |
work_keys_str_mv | AT leonjohndaniel securitywithgoexplorethepowerofgolangtosecurehostwebandcloudservices |