Offensive GoLang

Presented at Wild West Hackin' Fest 2019, Oct. 23, 2019, 5 p.m. (50 minutes)

Tools such as Metasploit, Mimikatz, and Netcat are household names amongst penetration testers and red teamers. They have been used for many years to get shells, dump creds, and move laterally with fanfare and impunity; however, times change. Network defenses are improving, and they are increasingly blocking the tools we rely on for successful penetration tests (good job vendors!). So how can you as a penetration tester deliver value to your clients when your essential tools are blocked? The short answer is you can “live off the land”, modify existing tools, or roll your own. But this is easier said than done. Our device ecosystem is growing rapidly. On a single engagement you may face systems including Windows, Mac, Linux, mobile, IoT, and more. You don’t have time to learn 6 programming languages. You can’t expect needed runtime environments to be present on all targets. And you need solutions that are easy to create, maintain, and deploy. Enter GoLang. The Go programming language (GoLang) was built by computing pioneers from Google. They set out to create a language that is simple to read and write, easy to deploy, and able to scale. And it happens that Go has wondrous offensive capabilities. Offensive GoLang will provide an overview of the Go programming language, highlighting how it can be applied to penetration test and red team engagements. Attendees will enjoy several demos showcasing Go’s awesome offensive applications including creating cross platform executables, injecting A/V resilient shellcode, payload hardening, and more. At the conclusion of this presentation, viewers will have a strong understanding of how Go can be used to create simple, reliable, and scalable offensive tools. Outline: -Intro / Agenda -Overview of Go -Pros/Cons of Go versus other solutions (Python, PowerShell, C#, etc.) -Attack all the things with cross compilation -Easily create Windows DLLs with Go -How to model advanced threats with A/V resilient shellcode injection -How to use Goroutines to speed up password cracking -Getting low level with W32 -Defense Evasion with Go -Popular open source projects (Merlin, Egesploit, goBuster, and more!) -Conclusion / Q&A

Presenters:

  • Michael C. Long II - MITRE Corporation
    Michael Long is a Senior Cyber Adversarial Engineer with the MITRE Corporation and a former U.S. Army Cyber Operations Specialist. Michael has over 10 years of experience in information security disciplines including adversary threat emulation, red teaming, threat hunting, and digital forensics and incident response. Michael Long has a proven track record of service in the public interest. Michael served on countless cyber operations for organizations including the Army Cyber Protection Brigade and Army Cyber Command, the results of which he regularly briefed to commanding generals, strategic executives, and congressional staffers. With MITRE, Michael continues to apply his technical expertise to improve the cybersecurity of our nations most sensitive and critical networks. Michael has a Masters Degree in Information Security Engineering from SANS Technology Institute, and holds many information security certifications including the prestigious GIAC Security Expert certification (GSE).

Links:

Similar Presentations: