Book Image

Security with Go

By : John Daniel Leon, Gaekwad
Book Image

Security with Go

By: John Daniel Leon, Gaekwad

Overview of this book

Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security. Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information. Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.
Table of Contents (15 chapters)

Summary

Having read this chapter, you will now understand how a basic brute force attack works against different applications. You should be able to adapt the examples given here to attack different protocols based on your needs.

Remember, these examples can be dangerous and potentially cause a denial of service, and it is not recommended that you run them against production services unless it is for the purpose of testing your brute force safeguards. Only perform these tests against services that you control, have permission to test, and understand the repercussions. You should never use these examples or these types of attacks against services you don't own, or you could break laws and land yourself in serious legal trouble.

There are fine legal lines that can be hard to distinguish for tests. For example, if you are renting a hardware appliance, you technically do not...