Hacking with Go
Natalie and Mat explore hacking in Go from the eyes of 2 security researchers. Joakim Kennedy and JAGS have both used Go for hacking: writing malware, hardware hacking, reverse engineering Go code, and more.
Changelog++ members save 6 minutes on this episode because they made the ads disappear. Join today!
- Teleport – Securely access any computing resource anywhere. Engineers and security teams can unify access to SSH servers, Kubernetes clusters, web applications, and databases across all environments. Try Teleport today in the cloud, self-hosted, or open source at goteleport.com
Incident.io – Create, manage, and resolve incidents directly in Slack. Use the
/incidentcommand to create and manage incidents. This command lets you share updates, assign roles, set important links and more – all without ever leaving the incident channel. Each incident gets their own Slack channel plus a high-res dashboard at incident.io with the entire timeline from report to resolution. Learn more and sign up for free at incident.io — no credit card required.
- Honeycomb – Guess less, know more. When production is running slow, it’s hard to know where problems originate: is it your application code, users, or the underlying systems? With Honeycomb you get a fast, unified, and clear understanding of the one thing driving your business: production. Join the swarm and try Honeycomb free today at honeycomb.io/changelog
- Linode – Get $100 in free credit to get started on Linode – Linode is our cloud of choice and the home of Changelog.com. Head to linode.com/changelog OR text CHANGELOG to 474747 to get instant access to that $100 in free credit.
- Joakim Kennedy – Twitter, GitHub, Website
- Juan Andrés Guerrero-Saade – Twitter, Website
- Natalie Pistunovich – Twitter, GitHub
- Mat Ryer – Twitter, GitHub, LinkedIn, Website
Notes and Links
- Sunburst, part of the SolarWinds attack report 1 report 2
- Flareon challenge?
- Malware using IPFS
- Ninja jobs - security jobs portal
- Go Reverse Engineering Tool Kit has both a library and a CLI tool to analyze Go binaries
- Zebrocy, malware written in soooo many languages
- “High profile ransomware written in Go”
Something missing or broken? PRs welcome!