Ethical Hacking with Go programming language: Build tools

Learn Hacking from Scratch with Go programming language, Build tools for Ethical hacking

4.70 (60 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Ethical Hacking with Go programming language: Build tools
726
students
8 hours
content
Apr 2020
last update
$49.99
regular price

What you will learn

What is Hacking

How to Use go language for Hacking

How to Change MAC address using golang

How to create a TCP network Scanner

How to Perform Man in the Middle attack using golang

Perform Packet capturing and interception

Create your own malware

Running Commands remotely on victim

Navigating File system on victim machine

Stealing Files and Folders from victim machine

Uploading Viruses on victim Machine

Creating your own keylogger

How to Package your malware into a trojan

Why take this course?

In this course we will learn hacking using Go language.  Go is an open source programming language created by Google. As one of the fastest growing languages in terms of popularity, its a great time to pick up the language and start using it.

First we start with learning about why we should use go language and what are its advantages. Then we will start diving into what hacking is and what are different types of hacking. We will learn how to keep ourselves secure over LAN by developing a program for changing MAC address. Then we will create a Network Scanner that will help us in scanning devices over our local network and finding out their IP and MAC addresses. During our course, we will explore a lot of aspects of hacking using go language in detail and use important packages for Hacking purposes.


In the later part of our course, we will start developing programs that will help us in hacking. Firstly we will perform a man in the middle attack using ARP spoofing and then we will intercept traffic between users. Then we will create our own backdoor malware that will give us complete control over the victim machine using a power-shell , i.e you will be able to run commands on the remote PC. We will also develop a functionality to steal user files from his machine using our backdoor.

Reviews

Diego
July 1, 2023
It's a very informative course, but it's not for beginners. Because require an average level of understanding in the Golang language. At the time, i already had a begginer's level, wich sometimes made me stop the course and study until i understood some basic concepts. But some content in this course requires research. Because in the new version of Golang, some libs like 'io/ioutil' have been descontinued.
David
July 27, 2021
A pre-req for this course is golang. I think it is safe to assume that if someone knows golang they will already know basic terminology. Perhaps notes on this would be more efficient.
Jacek
June 19, 2021
I believe this if focused to much on beginners. Normally I would rate after I finished the course, but the author asks to rate immediately.
Casey
November 17, 2020
This course is great, it goes over using Go in a hacker context. What is taught in this course allows you to build some powerful security tools.
Andrea
May 4, 2020
This was really good for pushing me on refreshing my System Engineering Background. Thanks to it I decided to experiment back on “defensive programming” and thanks to John Daniel Leon’s book: Security With Go, I spent 2 months coding on what is really missing to this course. What is missed is an entire in depth exploration on: - File buffering - Crypting/Decrypting - TLS client/server communication - Remote SSH2 - TCP packet injection and detection - Multi-part zipping - Encoding all I know that this would be impossible in 8 hours, but for any course in Udemy , even quick and dirty like this, I’m expecting at least some exploration and additional information on things, then thanks to COVID -19 quarantine I decided to compensate and do it by myself: In my GitHub you can find 2 months of coding around everything you need to know on “BE SAFE ON PROGRAMMING”. https://github.com/Gammaglobulino/exec_sys_commands If you explore the tool section you find tons of utility and practical code you can use for your day-by-day experimentations. I used as usual Extreme TTD and GOF patterns, something that I think even an “Hacker” should experiment when crafting their malicious code, at the end we write code for human and not the machine. I suggest you to look into the “sending and receive command loop” folder, in there I crafted a Generic Pipe of Command that you can use to send and receive jacked objects during a TCP client/server section: force you to be SOLID (Open to extension but close to modification). During this experiment I overcome some problem on GOB serialization of interface{}, using gob.Register: gob.Register(&sending_receiving_command_loop.DataRemoteCommand{}) gob.Register(&sending_receiving_command_loop.RemoteCommand{}) As usual , the tests speaks in place of the documentation and no human words are added, if you need any help please use GitHub to send me a message. Hope this help.
Samuel
March 31, 2020
The course gives a very good insight into an EH with Golang and you will learn a lot about IT-Secruity in general. Important basics such as networks etc. will be covered again briefly. In my opinion you should have a basic knowledge of Golang before you start this course. The teacher speaks a clear and understandable English and explains the knowledge in a comprehensible way. A clear recommendation for everyone who is interested in IT-Secruity and Golang.
Marouf
March 13, 2020
Very detailed course , teacher is very helpful and reply to question very fast. the material are well presented and explained to the core , i recommend it 100% Good Job Sir!
Mukesh
February 28, 2020
Great course! It contains a lot of useful stuffs to master EH with Golang. I really enjoyed and learned a lot from this course. The instructor demonstrates stuffs in a professional manner.
David
February 28, 2020
This is an amazing course, exactly what I was looking for. I'm learning networking and security and there is already a lot of material that focuses on other programming languages but i couldn't find anything that relates to golang. This course offered me exactly that. There is some issue with the audio and I'm in my early phase of this course but so far I'm very content with it. I will give proper review once I complete this course.
Azhar
February 28, 2020
In an urge to become an information security expert, I am happy to say that I have found this course very helpful. Thank you, Instructor.

Charts

Price

Ethical Hacking with Go programming language: Build tools - Price chart

Rating

Ethical Hacking with Go programming language: Build tools - Ratings chart

Enrollment distribution

Ethical Hacking with Go programming language: Build tools - Distribution chart
2793238
udemy ID
2/3/2020
course created date
2/29/2020
course indexed date
Lee Jia Cheng
course submited by