Loading…
Wednesday, October 23 • 5:00pm - 5:50pm
Offensive GoLang

Sign up or log in to save this to your schedule and see who's attending!

Feedback form is now closed.
Tools such as Metasploit, Mimikatz, and Netcat are household names amongst penetration testers and red teamers. They have been used for many years to get shells, dump creds, and move laterally with fanfare and impunity; however, times change. Network defenses are improving, and they are increasingly blocking the tools we rely on for successful penetration tests (good job vendors!).

So how can you as a penetration tester deliver value to your clients when your essential tools are blocked?

The short answer is you can “live off the land”, modify existing tools, or roll your own. But this is easier said than done. Our device ecosystem is growing rapidly. On a single engagement you may face systems including Windows, Mac, Linux, mobile, IoT, and more. You don’t have time to learn 6 programming languages. You can’t expect needed runtime environments to be present on all targets. And you need solutions that are easy to create, maintain, and deploy.

Enter GoLang. The Go programming language (GoLang) was built by computing pioneers from Google. They set out to create a language that is simple to read and write, easy to deploy, and able to scale. And it happens that Go has wondrous offensive capabilities.

Offensive GoLang will provide an overview of the Go programming language, highlighting how it can be applied to penetration test and red team engagements. Attendees will enjoy several demos showcasing Go’s awesome offensive applications including creating cross platform executables, injecting A/V resilient shellcode, payload hardening, and more. At the conclusion of this presentation, viewers will have a strong understanding of how Go can be used to create simple, reliable, and scalable offensive tools.

Outline:
-Intro / Agenda
-Overview of Go
-Pros/Cons of Go versus other solutions (Python, PowerShell, C#, etc.)
-Attack all the things with cross compilation
-Easily create Windows DLLs with Go
-How to model advanced threats with A/V resilient shellcode injection
-How to use Goroutines to speed up password cracking
-Getting low level with W32
-Defense Evasion with Go
-Popular open source projects (Merlin, Egesploit, goBuster, and more!)
-Conclusion / Q&A

Speakers
avatar for Michael C. Long II

Michael C. Long II

MITRE Corporation
Michael Long is a Senior Cyber Adversarial Engineer with the MITRE Corporation and a former U.S. Army Cyber Operations Specialist. Michael has over 10 years of experience in information security disciplines including adversary threat emulation, red teaming, threat hunting, and digital... Read More →


Wednesday October 23, 2019 5:00pm - 5:50pm
Main Stage

Attendees (90)