Skip to Content
Black Hat Go
book

Black Hat Go

by Tom Steele, Chris Patten, Dan Kottmann
January 2020
Intermediate to advanced content levelIntermediate to advanced
368 pages
9h 46m
English
No Starch Press
Content preview from Black Hat Go

9WRITING AND PORTING EXPLOIT CODE

Image

In the majority of the previous chapters, you used Go to create network-based attacks. You’ve explored raw TCP, HTTP, DNS, SMB, database interaction, and passive packet capturing.

This chapter focuses instead on identifying and exploiting vulnerabilities. First, you’ll learn how to create a vulnerability fuzzer to discover an application’s security weaknesses. Then you’ll learn how to port existing exploits to Go. Finally, we’ll show you how to use popular tools to create Go-friendly shellcode. By the end of the chapter, you should have a basic understanding of how to use Go to discover flaws while also using ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Black Hat Python, 2nd Edition

Black Hat Python, 2nd Edition

Justin Seitz, Tim Arnold
Head First Go

Head First Go

Jay McGavren
TCP/IP Guide

TCP/IP Guide

Charles M. Kozierok

Publisher Resources

ISBN: 9781098122645