Scripting to find named hosts | Golang tutorial [FREE COURSE CONTENT]

(318 views)

Scripting is a crucial skill to make your ethical hacking more streamlined and efficient. In this video from our Pentesting with Golang online course you will see how you can write a very useful script. It will allow you to scan a network for named hosts after you gain initial access - excellent for recon, lateral movement, persistence, and privilege escalation! Watch the video and up your scripting skills with some Golang: 



Learn more scripting with Golang: book you seat! 

In this course, we’ll take you on a journey to using Golang for security purposes such as OSINT technicals, scanning, reconnaissance, interacting with APIs and many more techniques that are essential for penetration testers and hackers. Everything is different because it is Golang! Golang is used in a wide range of security projects.

What skills will you gain?

  • Concurrency programming
  • Write your own security tools
  • Scripting 
  • Golang network modules
  • Networking with Go
  • Socket Programming and using it for penetration testing
  • Interacting with search engines and APIs

What will you learn about?

  • net(lib)
  • GoQuery(lib)
  • html(lib)
  • HTML Scraping and Escaping
  • Goroutine and concurrency technicals in Go
  • Bruteforce Attacks
  • Information gathering and Scanning phases
  • Socket Programming
  • Servers and clients

Why take it NOW? 

Because the Golang is becoming more and more popular and its use in the field of security. So that in the near future most projects and security tools will be written in Golang.

Who is this course for? 

This course is for you if you are a Network Engineer, Hacker, Penetration Tester, Network Security, System Administrator and you are looking for a source to start penetration testing with Golang.

Why this course? 

It is a hands-on and practical course that avoids theoretical concepts. You can take this course if you want to level-up your knowledge in the penetration testing field and programming. This course is for you if you would like to write your own security tool with Golang.

Estimated times to finish the course modules:

  • Installation and Introduction, 30-50m
  • Go syntax, 80m
  • Enumeration and Scanning, 30-40m
  • Packet Capturing, 30m
  • Brute Force, 30-40m
  • OSINT, 60m
  • Web Scraping, 60m
  • Steganography, 60m
  • TOTAL: About 400m, 6.30h

Another course by this instructor, done for our sister project: NLP for OSINT and Threat Analysis

February 10, 2022
Subscribe
Notify of
guest
2 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
25 days ago

Have you ever wanted to spy on your spouse’s phone or wanted to monitor their phone? you may want to know what is happening in their life or how they are communicating with someone else. or maybe you want to protect them from ex either way. you can contact ([email protected]), talk about it with kelvin. you want to hack your husband’s whatsapp account text messages on iphone or android phone remotely and provide ways of doing it without installing any software on the target device. you will get complete access to whatsapp, facebook, kik, viber, messenger, text messages and other… Read more »

Lizzy Agnes
6 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at gmail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.