Go Time: Golang, Software Engineering

Hacking with Go: Part 2

Oct 13, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 4min
2
The SolarWinds Attack
04:29 • 3min
3
Are You Seeing More and More of These Malware Families?
07:58 • 2min
4
The Reasons for Using Go as an Attacking Language
09:53 • 4min
5
The Difference Between IDAPro and Go Language
13:37 • 5min
6
Go Reverse Engineering
18:41 • 2min
7
What Is Reverse Engineering?
20:17 • 2min
8
Go
22:17 • 1min
9
Idapro
23:46 • 2min
10
Reverse Engineering a Program
25:21 • 2min
11
Go - A New Way to Debug Java Programming
27:18 • 6min
12
Is Go a Good Language for Hackers?
32:51 • 2min
13
Is Rust a Good Programming Language?
34:45 • 3min
14
How to Deploy a Malware Detection Tool in an Infected Network
37:18 • 2min
15
Is Kasper's Key a Good Idea?
39:45 • 2min
16
Go Is a Memory Safe Language Unless I'm Mistaken
41:21 • 3min
17
Honeycomb - Find Your Most Perplexing Application Issues
44:29 • 2min
18
How to Reverse Engineer a C Programming Language?
46:46 • 2min
19
Reverse Engineering Go Programs With IDA Pro or GIDRA?
48:32 • 2min
20
The Basics of Reverse Engineering
50:51 • 3min
21
Ivan, What Is Your Unpopular Opinion?
54:20 • 2min
22
Do You Think the Google Play Store Is Safer Than the Apple Store?
56:28 • 3min
23
Is Cyberspace Never Going to Be Regulated?
59:56 • 3min
24
Hacking With Go - Part 3
01:02:46 • 2min