با برنامه Player FM !
Hacking with Go: Part 2
Manage episode 343973785 series 3341962
We’re once again exploring hacking in Go from the eyes of security researchers. This time, Natalie & Ian are joined by Ivan Kwiatkowski (a.k.a. Justice Rage)!
Changelog++ members save 6 minutes on this episode because they made the ads disappear. Join today!
Sponsors:
- Sourcegraph – Transform your code into a queryable database to create customizable visual dashboards in seconds. Sourcegraph recently launched Code Insights — now you can track what really matters to you and your team in your codebase. See how other teams are using this awesome feature at about.sourcegraph.com/code-insights
- FireHydrant – The reliability platform for every developer. Incidents impact everyone, not just SREs. FireHydrant gives teams the tools to maintain service catalogs, respond to incidents, communicate through status pages, and learn with retrospectives. Small teams up to 10 people can get started for free with all FireHydrant features included. No credit card required to sign up. Learn more at firehydrant.com/
- Honeycomb – Guess less, know more. When production is running slow, it’s hard to know where problems originate: is it your application code, users, or the underlying systems? With Honeycomb you get a fast, unified, and clear understanding of the one thing driving your business: production. Join the swarm and try Honeycomb free today at honeycomb.io/changelog
Featuring:
Show Notes:
- 🎧 Hacking with Go: Part 1
- Reversing in action: Golang malware used in the SolarWinds attack
- Stowaway
- Brute Ratel
- Reverse Engineering for Beginners
- Practical Malware Analysis
- Turing Complete on Steam
- The Zachtronics Puzzle Pack on Steam
Something missing or broken? PRs welcome!
فصل ها
1. Opener (00:00:00)
2. Sponsor: Sourcegraph (00:00:53)
3. Intro (00:03:17)
4. Welcoming Ivan to the show (00:04:00)
5. Getting to know Ivan (00:04:26)
6. Reversing the SolarWinds attack (00:05:20)
7. Famous Go malwarez (00:07:51)
8. How compiled Go is unique (00:13:21)
9. A primer on reverse engineering (00:19:53)
10. Surprises while reversing Go (00:24:40)
11. Sponsor: FireHydrant (00:30:57)
12. Do Go's idioms help reversing? (00:32:30)
13. Top languages for developing malware (00:35:26)
14. Forensics Mode (00:37:04)
15. Tips for writing secure Go code (00:41:09)
16. Sponsor: Honeycomb (00:44:55)
17. How Ivan got in to Go (00:46:37)
18. Tips for learning to reverse engineer (00:50:40)
19. It's time for Unpopular Opinions! (00:55:29)
20. Ivan's many unpops (00:56:04)
21. Do app stores improve security? (00:57:11)
22. Cyperspace regulation unpop (00:59:56)
23. Wrapping up (01:02:27)
24. Outro + clip from episode #205 (01:03:04)
347 قسمت
Manage episode 343973785 series 3341962
We’re once again exploring hacking in Go from the eyes of security researchers. This time, Natalie & Ian are joined by Ivan Kwiatkowski (a.k.a. Justice Rage)!
Changelog++ members save 6 minutes on this episode because they made the ads disappear. Join today!
Sponsors:
- Sourcegraph – Transform your code into a queryable database to create customizable visual dashboards in seconds. Sourcegraph recently launched Code Insights — now you can track what really matters to you and your team in your codebase. See how other teams are using this awesome feature at about.sourcegraph.com/code-insights
- FireHydrant – The reliability platform for every developer. Incidents impact everyone, not just SREs. FireHydrant gives teams the tools to maintain service catalogs, respond to incidents, communicate through status pages, and learn with retrospectives. Small teams up to 10 people can get started for free with all FireHydrant features included. No credit card required to sign up. Learn more at firehydrant.com/
- Honeycomb – Guess less, know more. When production is running slow, it’s hard to know where problems originate: is it your application code, users, or the underlying systems? With Honeycomb you get a fast, unified, and clear understanding of the one thing driving your business: production. Join the swarm and try Honeycomb free today at honeycomb.io/changelog
Featuring:
Show Notes:
- 🎧 Hacking with Go: Part 1
- Reversing in action: Golang malware used in the SolarWinds attack
- Stowaway
- Brute Ratel
- Reverse Engineering for Beginners
- Practical Malware Analysis
- Turing Complete on Steam
- The Zachtronics Puzzle Pack on Steam
Something missing or broken? PRs welcome!
فصل ها
1. Opener (00:00:00)
2. Sponsor: Sourcegraph (00:00:53)
3. Intro (00:03:17)
4. Welcoming Ivan to the show (00:04:00)
5. Getting to know Ivan (00:04:26)
6. Reversing the SolarWinds attack (00:05:20)
7. Famous Go malwarez (00:07:51)
8. How compiled Go is unique (00:13:21)
9. A primer on reverse engineering (00:19:53)
10. Surprises while reversing Go (00:24:40)
11. Sponsor: FireHydrant (00:30:57)
12. Do Go's idioms help reversing? (00:32:30)
13. Top languages for developing malware (00:35:26)
14. Forensics Mode (00:37:04)
15. Tips for writing secure Go code (00:41:09)
16. Sponsor: Honeycomb (00:44:55)
17. How Ivan got in to Go (00:46:37)
18. Tips for learning to reverse engineer (00:50:40)
19. It's time for Unpopular Opinions! (00:55:29)
20. Ivan's many unpops (00:56:04)
21. Do app stores improve security? (00:57:11)
22. Cyperspace regulation unpop (00:59:56)
23. Wrapping up (01:02:27)
24. Outro + clip from episode #205 (01:03:04)
347 قسمت
כל הפרקים
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.