Ethical Hacking with Go programming language: Build tools
3.7 (27 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
327 students enrolled

Ethical Hacking with Go programming language: Build tools

Learn Hacking from Scratch with Go programming language, Build tools for Ethical hacking
3.7 (27 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
327 students enrolled
Created by Fahad Sarwar
Last updated 4/2020
English
English [Auto]
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 8 hours on-demand video
  • 1 article
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • What is Hacking
  • How to Use go language for Hacking
  • How to Change MAC address using golang
  • How to create a TCP network Scanner
  • How to Perform Man in the Middle attack using golang
  • Perform Packet capturing and interception
  • Create your own malware
  • Running Commands remotely on victim
  • Navigating File system on victim machine
  • Stealing Files and Folders from victim machine
  • Uploading Viruses on victim Machine
  • Creating your own keylogger
  • How to Package your malware into a trojan
Requirements
  • Basics of go language
  • A working PC
Description

In this course we will learn hacking using Go language.  Go is an open source programming language created by Google. As one of the fastest growing languages in terms of popularity, its a great time to pick up the language and start using it.

First we start with learning about why we should use go language and what are its advantages. Then we will start diving into what hacking is and what are different types of hacking. We will learn how to keep ourselves secure over LAN by developing a program for changing MAC address. Then we will create a Network Scanner that will help us in scanning devices over our local network and finding out their IP and MAC addresses. During our course, we will explore a lot of aspects of hacking using go language in detail and use important packages for Hacking purposes.


In the later part of our course, we will start developing programs that will help us in hacking. Firstly we will perform a man in the middle attack using ARP spoofing and then we will intercept traffic between users. Then we will create our own backdoor malware that will give us complete control over the victim machine using a power-shell , i.e you will be able to run commands on the remote PC. We will also develop a functionality to steal user files from his machine using our backdoor.

Who this course is for:
  • Go language programmers who want to learn hacking
  • people who want to learn fundamentals of hacking
Course content
Expand all 116 lectures 07:56:38
+ What is Hacking
1 lecture 13:16
Hacking Introduction
13:16
+ Installation
5 lectures 17:45
Tools required
04:21
Installing go in windows
01:43
IDE to use
03:21
Linux Installation
05:02
Setting up golang
03:18
+ Executing System Commands
2 lectures 13:27
How to execute commands
09:26
Refactoring code
04:01
+ Changing MAC
4 lectures 19:50
Running "ifconfig" command on PC
06:21
Changing MAC using ifconfig
02:01
Creating a program to automatically change MAC
03:27
Creating executable and parsing flags
08:01
+ Creating Network Scanner
8 lectures 47:48
Creating a TCP scanner basic
06:05
Scanning Multiple ports
04:20
Scanning Multiple ports continued
01:00
TCP scanner Concurrent
06:18
TCP scanner Concurrent continued
01:51
Network Mapper Introduction - NMAP
10:54
Nmap in golang
13:43
Creating an nmap program in golang
03:37
+ Man in the Middle Attack - MITM with ARP
6 lectures 25:14
Address Resolution Protocol - ARP
06:24
ARP spoofing
04:55
Installing ARP spoof Program
01:45
Enabling IP packet forwarding
02:08
Performing MITM attack
04:53
Capturing Intercepted Packets
05:09
+ Intercepting Packets
9 lectures 35:29
Installing gopacket package in golang
01:33
Finding devices
05:54
searching for devices over a machine
01:23
Capturing Packets
03:38
intercepting live traffic
05:36
Intercepting traffic from source
05:11
Spoofed packets
02:21
Stealing Credentials
07:51
Stealing Logins over HTTP
02:02
+ Malware - Creating your own Malware Backdoor RAT
19 lectures 01:40:24
Introduction to malware
05:52
Creating Hacker Server
07:10
Writing Victim Program
03:35
Running Server and Victim Programs
02:17
Clean up server program
06:35
Clean up victim program
05:07
Sending Data from server to victim
04:28
Receiving data from hacker server
07:42
Sending gob structs to victim
08:47
Receiving gob structs at victim machine
02:47
Running the program to send and receive gobs
01:42
Executing command server side
12:04
Exit condition
01:17
Victim Side main function
06:36
Server logic command execution
08:23
Victim Logic command execution
06:51
Victim Logic command execution Part 2
05:15
Minor Error
00:19
Executing Commands Complete program
03:37