Go Audit and Code Review

Discover which kind of security bugs can be found inside Go code and how to detect them statically.

What you'll learn?

In this course, you will focus on learning Go code audit and vulnerability research. First, You will discover the internal of Go and which security mechanisms are enforced by default. Then, you will learn which vulnerabilities are the most common and how to find low-hanging fruits bugs manually and automatically using different Go auditing tools.

  • Introduction to Go
  • Golang Ecosystem
  • Security concepts
    • Concurrency, Garbage collector, etc.
  • Golang common vulnerabilities
    • Panicking function
    • Arithmetic errors
    • Out-of-bounds panics
    • SIGSEGV / Nil pointer dereference
    • Resource exhaustion / OOM, Stack overflow
  • Advanced vulnerabilities
    • Unsafe code
    • Data races, Race conditions, 
    • Memory Leak, Logic errors
    • Concurrency issues (Deadlock, Goroutine leak, etc.)
    • Web Application Vulnerabilities (SQLI, XSS, etc.)
  • Attack surface discovery
  • Auditing tools
  • Exercises

Along with this training, you will deal with a lot of hands-on exercises allowing you to internalize concepts and techniques taught in the course.

  • $2,400

Go Security Audit and Fuzzing

  • Bundle
  • 3 Products

Learn which kind of security vulnerabilities/bugs can be found inside Go code, how to detect them statically and automatically using fuzzing techniques. šŸŽžļø 90 videos / ā±ļø 7.5 hours / šŸ‘Øā€šŸ’» 25+ exercises

What's included?

Welcome & Summary

Welcome & Overview
    Preview
    Summary
      Preview

      Materials

      Day1_Go_Security_Audit_And_Code_Review_v1_0.pdf
      • 9.24 MB
      Day1_Go_Security_Audit_And_Code_Review_v1_1.pdf
      • 9.28 MB
      go_security_day_1.zip
      • 1.52 MB

      1. Introduction to Go

      1.0 - Introduction to Go
      • 5 mins
      • 138 MB
      1.1 - Go basic101
      • 17 mins
      • 535 MB
      1.2 - Learning Go
      • 4 mins
      • 109 MB
      1.3 - Examples
      • 12 mins
      • 375 MB

      2. Golang Ecosystem

      2.0 - Go ecosystem
      • 1 min
      • 29.2 MB
      Preview
      2.1 - Go toolchains
      • 6 mins
      • 168 MB
      2.2 - Labs vuln_tester
      • 4 mins
      • 115 MB
      2.3 - Compilation
      • 9 mins
      • 272 MB
      2.4 - Development tools
      • 3 mins
      • 82.7 MB
      2.5 - Development IDEs
      • 3 mins
      • 83.5 MB

      3. Design & Security in Go

      3.0 - Design & security
      • 5 mins
      • 143 MB
      3.1 - Type checking
      • 3 mins
      • 69.6 MB
      3.2 - Memory & Garbage collection
      • 5 mins
      • 151 MB
      3.3 - Concurrency
      • 5 mins
      • 153 MB
      3.4 - Error handling
      • 12 mins
      • 370 MB

      4. Go common vulnerabilities

      4.0 - Go vulnerabilities
      • 3 mins
      • 67.6 MB
      Preview
      4.1 - Panicking functions
      • 7 mins
      • 234 MB
      4.2 - Arithmetic errors
      • 8 mins
      • 249 MB
      4.3 - Out of bound panics
      • 4 mins
      • 124 MB
      4.4 - SIGSEGV - Nil pointer dereference
      • 5 mins
      • 161 MB
      4.5 - Resource exhaustion / OOM
      • 7 mins
      • 201 MB
      4.6 - Stack overflow
      • 2 mins
      • 65.5 MB
      4.7 - Exercise 1
      • 3 mins
      • 72.2 MB
      4.8 - Exercise 1: Correction
      • 9 mins
      • 280 MB
      4.9 - Exercise 2
      • 1 min
      • 28.2 MB
      4.10 - Exercise 2: Correction
      • 8 mins
      • 239 MB

      5. Advanced vulnerabilities

      5.0 - Unsafe code
      • 13 mins
      • 428 MB
      5.1 - Race Conditions / Data Races
      • 9 mins
      • 295 MB
      5.2 - Web App vulns
      • 6 mins
      • 187 MB
      5.3 - Concurrency issues
      • 9 mins
      • 276 MB
      5.4 - Others issues
      • 4 mins
      • 118 MB

      6. Audit and Code Review

      6.0 - Code audit & attack surface
      • 11 mins
      • 340 MB
      6.1 - Auditing tools
      • 12 mins
      • 390 MB
      6.2 - Testing
      • 2 mins
      • 66.1 MB
      6.3 - Exploitation & Hardening
      • 4 mins
      • 128 MB
      6.4 - Audit report/database
      • 3 mins
      • 95.1 MB
      6.5 - Interesting targets
      • 3 mins
      • 99.3 MB
      6.6 - Exercises 1
      • 2 mins
      • 40.3 MB
      6.7 - Exercises 1: Correction
      • 3 mins
      • 72.3 MB
      6.8 - Exercises 2
      • 1 min
      • 24.3 MB
      6.9 - Exercises 2: Correction
      • 3 mins
      • 83.8 MB
      7.0 - Closing remarks
      • 2 mins
      • 33.8 MB

      • $2,400

      Go Security Audit and Fuzzing

      • Bundle
      • 3 Products

      Learn which kind of security vulnerabilities/bugs can be found inside Go code, how to detect them statically and automatically using fuzzing techniques. šŸŽžļø 90 videos / ā±ļø 7.5 hours / šŸ‘Øā€šŸ’» 25+ exercises

      Meet Your Instructor

      Hey! šŸ‘‹ My name is Patrick and I'm the founder of FuzzingLabs, a research-oriented security company specializing in fuzzing, vulnerability research, and reverse engineering.

      Over time, we found hundreds of bugs and presented our work at various security conferences around the globe, including BlackHat USA, OffensiveCon, REcon, Devcon, EthCC, RingZer0, ToorCon, hack.lu, NorthSec, Microsoft DCC, etc.

      You can read more about me by clicking here.

      FREE Resources & Trainings

      Enter your email to receive special deals and a bundle of awesome resources. 100% free - 100% awesome. šŸ‘‡

      You're signing up to receive emails from FuzzingLabs Academy