Book Image

Security with Go

By : John Daniel Leon, Karthik Gaekwad
Book Image

Security with Go

By: John Daniel Leon, Karthik Gaekwad

Overview of this book

Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security. Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information. Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.
Table of Contents (15 chapters)

Saving to the pcap file

This program will perform a packet capture and store the results in a file. The important step in this example is the call to the pcapgo package—the WriteFileHeader() function of Writer. After that, the WritePacket() function can be used to write the desired packets to a file. You can capture all the traffic and choose to write only specific packets based on your own filtering criteria, if desired. Perhaps you only want to write odd or malformed packets to log anomalies.

To do the equivalent with tcpdump, just pass it the -w flag with a filename, as shown in the following command:

tcpdump -i eth0 -w my_capture.pcap

The pcap files created with this example can be opened with Wireshark and viewed just like files created with tcpdump.

This example creates an output file named test.pcap and opens a network device for live capture. It captures 100 packets...