Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Security with Go

You're reading from   Security with Go Explore the power of Golang to secure host, web, and cloud services

Arrow left icon
Product type Paperback
Published in Jan 2018
Publisher Packt
ISBN-13 9781788627917
Length 340 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (2):
Arrow left icon
Karthik Gaekwad Karthik Gaekwad
Author Profile Icon Karthik Gaekwad
Karthik Gaekwad
John Daniel Leon John Daniel Leon
Author Profile Icon John Daniel Leon
John Daniel Leon
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

1. Introduction to Security with Go FREE CHAPTER 2. The Go Programming Language 3. Working with Files 4. Forensics 5. Packet Capturing and Injection 6. Cryptography 7. Secure Shell (SSH) 8. Brute Force 9. Web Applications 10. Web Scraping 11. Host Discovery and Enumeration 12. Social Engineering 13. Post Exploitation 14. Conclusions 15. Another Book You May Enjoy

Social Engineering

Social engineering is when an attacker manipulates or tricks a victim into performing an action or providing private information. This is often done by impersonating a trusted person, creating a sense of urgency, or creating a false pretext to push the victim to act. The action may be as simple as divulging information, or more complex like downloading and executing malware.

We cover honeypots in this chapter, even though they are sometimes intended to trick bots and not humans. The goal is to intentionally deceive, which is the core of social engineering. We provide basic honeypot examples including TCP and HTTP honeypots.

There are many other types of social engineering that are not covered in this book. This includes physical or in-person situations, such as tailgating and pretending to be a maintenance worker, as well as other digital and remote methods...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image