Book Image

Security with Go

By : John Daniel Leon, Karthik Gaekwad
Book Image

Security with Go

By: John Daniel Leon, Karthik Gaekwad

Overview of this book

Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security. Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information. Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.
Table of Contents (15 chapters)

Gathering intel via JSON REST API

REST with JSON are becoming the de facto interface for web APIs. Every API is different, so the primary objective of this example is to show how to process JSON data from a REST endpoint.

This example will take Reddit username as an argument, and print the recent posts and comments by that user to get an idea of what topics they discuss. Reddit was chosen for this example because no authentication is required for certain endpoints, making it easy to test. Other services that provide REST APIs that you could query for intel gathering are Twitter and LinkedIn.

Remember, the emphasis of this example is to provide an example of parsing JSON from a REST endpoint. Since every API is different, this example should serve as a reference when writing your own programs to interact with JSON APIs. A data structure must be defined to match the response from...