Security with Go

The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion
Preview in Mapt

Security with Go

John Daniel Leon

The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion

Quick links: > What will you learn?> Table of content

Mapt Subscription
FREE
$29.99/m after trial
eBook
$22.40
RRP $31.99
Save 29%
Print + eBook
$39.99
RRP $39.99
What do I get with a Mapt Pro subscription?
  • Unlimited access to all Packt’s 5,000+ eBooks and Videos
  • Early Access content, Progress Tracking, and Assessments
  • 1 Free eBook or Video to download and keep every month after trial
What do I get with an eBook?
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with Print & eBook?
  • Get a paperback copy of the book delivered to you
  • Download this book in EPUB, PDF, MOBI formats
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
What do I get with a Video?
  • Download this Video course in MP4 format
  • DRM FREE - read and interact with your content when you want, where you want, and how you want
  • Access this title in the Mapt reader
$0.00
$22.40
$39.99
$29.99 p/m after trial
RRP $31.99
RRP $39.99
Subscription
eBook
Print + eBook
Start 14 Day Trial

Frequently bought together


Security with Go Book Cover
Security with Go
$ 31.99
$ 22.40
iOS Augmented Reality with ARKit [Video] Book Cover
iOS Augmented Reality with ARKit [Video]
$ 124.99
$ 106.25
Buy 2 for $35.00
Save $121.98
Add to Cart

Book Details

ISBN 139781788627917
Paperback340 pages

Book Description

Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.

Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.

Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.

Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.

Table of Contents

Chapter 1: Introduction to Security with Go
About Go
Why use Go for security?
Development environment
Running Go examples
Summary
Chapter 2: The Go Programming Language
Go language specification
The Go playground
A tour of Go
Keywords
Notes about source code
Comments
Types
Control structures
Defer
Packages
Classes
Goroutines
Getting help and documentation
Summary
Chapter 3: Working with Files
File basics
Reading and writing
Archives
Compression
Creating temporary files and directories
Downloading a file over HTTP
Summary
Chapter 4: Forensics
Files
Steganography
Network
Summary
Chapter 5: Packet Capturing and Injection
Prerequisites
Getting a list of network devices
Capturing packets
Capturing with filters
Saving to the pcap file
Reading from a pcap file
Decoding packet layers
Creating a custom layer
Converting bytes to and from packets
Creating and sending packets
Decoding packets faster
Summary
Chapter 6: Cryptography
Hashing
Encryption
Summary
Chapter 7: Secure Shell (SSH)
Using the Go SSH client
Summary
Chapter 8: Brute Force
Brute forcing HTTP basic authentication
Brute forcing the HTML login form
Brute forcing SSH
Brute forcing database login
Summary
Chapter 9: Web Applications
HTTP server
HTTP client
Summary
Chapter 10: Web Scraping
Web scraping fundamentals
Using the goquery package for web scraping
How to protect against web scraping
Summary
Chapter 11: Host Discovery and Enumeration
TCP and UDP sockets
Port scanning
Grabbing a banner from a service
Creating a TCP proxy
Finding named hosts on a network
Fuzzing a network service
Summary
Chapter 12: Social Engineering
Gathering intel via JSON REST API
Sending phishing emails with SMTP
Generating QR codes
Honeypots
Sandboxing
Summary
Chapter 13: Post Exploitation
Cross compiling
Creating bind shells
Creating reverse bind shells
Creating web shells
Finding writable files
Changing file timestamp
Changing file permissions
Changing file ownership
Summary
Chapter 14: Conclusions
Recapping the topics you have learned
More thoughts on the usage of Go
What I hope you take away from the book
Be aware of legal, ethical, and technical boundaries
Where to go from here
Getting help and learning more

What You Will Learn

  • Learn the basic concepts and principles of secure programming
  • Write secure Golang programs and applications
  • Understand classic patterns of attack
  • Write Golang scripts to defend against network-level attacks
  • Learn how to use Golang security packages
  • Apply and explore cryptographic methods and packages
  • Learn the art of defending against brute force attacks
  • Secure web and cloud applications

Authors

Table of Contents

Chapter 1: Introduction to Security with Go
About Go
Why use Go for security?
Development environment
Running Go examples
Summary
Chapter 2: The Go Programming Language
Go language specification
The Go playground
A tour of Go
Keywords
Notes about source code
Comments
Types
Control structures
Defer
Packages
Classes
Goroutines
Getting help and documentation
Summary
Chapter 3: Working with Files
File basics
Reading and writing
Archives
Compression
Creating temporary files and directories
Downloading a file over HTTP
Summary
Chapter 4: Forensics
Files
Steganography
Network
Summary
Chapter 5: Packet Capturing and Injection
Prerequisites
Getting a list of network devices
Capturing packets
Capturing with filters
Saving to the pcap file
Reading from a pcap file
Decoding packet layers
Creating a custom layer
Converting bytes to and from packets
Creating and sending packets
Decoding packets faster
Summary
Chapter 6: Cryptography
Hashing
Encryption
Summary
Chapter 7: Secure Shell (SSH)
Using the Go SSH client
Summary
Chapter 8: Brute Force
Brute forcing HTTP basic authentication
Brute forcing the HTML login form
Brute forcing SSH
Brute forcing database login
Summary
Chapter 9: Web Applications
HTTP server
HTTP client
Summary
Chapter 10: Web Scraping
Web scraping fundamentals
Using the goquery package for web scraping
How to protect against web scraping
Summary
Chapter 11: Host Discovery and Enumeration
TCP and UDP sockets
Port scanning
Grabbing a banner from a service
Creating a TCP proxy
Finding named hosts on a network
Fuzzing a network service
Summary
Chapter 12: Social Engineering
Gathering intel via JSON REST API
Sending phishing emails with SMTP
Generating QR codes
Honeypots
Sandboxing
Summary
Chapter 13: Post Exploitation
Cross compiling
Creating bind shells
Creating reverse bind shells
Creating web shells
Finding writable files
Changing file timestamp
Changing file permissions
Changing file ownership
Summary
Chapter 14: Conclusions
Recapping the topics you have learned
More thoughts on the usage of Go
What I hope you take away from the book
Be aware of legal, ethical, and technical boundaries
Where to go from here
Getting help and learning more

Book Details

ISBN 139781788627917
Paperback340 pages
Read More

Read More Reviews

Recommended for You

iOS Augmented Reality with ARKit [Video] Book Cover
iOS Augmented Reality with ARKit [Video]
$ 124.99
$ 106.25
Building RESTful Web services with Go Book Cover
Building RESTful Web services with Go
$ 35.99
$ 25.20
Learn iOS 11 Programming with Swift 4 - Second Edition Book Cover
Learn iOS 11 Programming with Swift 4 - Second Edition
$ 39.99
$ 28.00
Getting Familiar with Windows Server 2016 Administration [Video] Book Cover
Getting Familiar with Windows Server 2016 Administration [Video]
$ 124.99
$ 106.25
Advanced Neural Networks with Tensorflow [Video] Book Cover
Advanced Neural Networks with Tensorflow [Video]
$ 124.99
$ 106.25
Test Driven Web Application Development with Ember [Video] Book Cover
Test Driven Web Application Development with Ember [Video]
$ 124.99
$ 106.25