So far in this book, we covered many topics about Go and information security. The topics covered are useful for a variety of people, including developers, penetration testers, SOC analysts, computer forensic analysts, network and security engineers, and DevOps engineers. Here is a high-level recap of the topics covered:
- The Go programming language
- Working with files
- Forensics
- Packet capture and injection
- Cryptography
- Secure shell (SSH)
- Brute force
- Web applications
- Web scraping
- Host discovery and enumeration
- Social engineering and honeypots
- Post exploitation