Skip to main content

Installation and use of go

What is go?

Go (Golang) is often used to develop and install various tools in Kali Linux, particularly those focused on security, penetration testing, and network analysis. 

Use of Go in Installing Tools on Kali Linux:

Development of Security Tools:

  • Tools Written in Go: Many modern security tools available on Kali Linux are written in Go due to its speed, efficiency, and simplicity. Examples include Subfinder (a subdomain discovery tool), Amass (a network mapping tool), and GoBuster (a directory/file brute-forcing tool).

Ease of Installation:

  • Go Environment: Installing Go tools often requires setting up a Go environment, which is straightforward on Kali Linux. Once set up, tools can be installed using Go’s package manager with a single command, often from source repositories like GitHub.
  • Go Get Command: You can install many Go-based tools using the go get command, which fetches the tool’s source code, compiles it, and installs it.

Cross-Platform Compatibility:

  • Universal Tools: Go’s ability to compile to different platforms ensures that tools developed on Kali can be used across various environments, making them highly portable.

 Steps for install go:

  • first go in terminal. and type go version and check go is already installed or not.
  • if the go lang is already installed but not properly working then for uninstall type sudo rm -rf /usr/local/go .
  • then go on the official site of Golang (https://go.dev/doc/install) and install the file.
  • then go in download folder. for that use cd Downloads.
  • than check file installed or not. for that use ls.
  • than type tar -xzf go1.22.6.linux-amd64.tar.gz.
  • then check the go is installed or not. for that use ls.
  • then move this to user/local. for that use sudo mv go /user/local.
  • then open bashrc. for that type mousepad /.bashrc. 
  • then go at last and type the path (export PATH=$PATH:/usr/local/go/bin). and restart the terminal.
  • then again open the terminal and type go version for check go is installed or not. 
  • if not installed then open mousepad /.zshrc then go at last and type the path (export PATH=$PATH:/usr/local/go/bin) and restart the terminal. 

Comments

Popular posts from this blog

OWASP Top 10 : Understanding Broken Access Control

What is broken access control? Broken access control is a security issue where users can access data or perform actions that they shouldn't be allowed to. This happens when the system fails to properly enforce rules about what users can and cannot do. Types of access controls :  1 . Vertical privilege escalation:  Vertical privilege escalation happens when a normal user gains access to functionalities reserved for higher-privileged users. Example:  A normal user can change the policies of the company.  2. Horizontal privilege escalation:  Horizontal privilege escalation allows a user to switch their access to another user's account, essentially impersonating them. Example:  A normal user can switch their account to admin.  3 . Insecure direct object reference ( IDOR):  IDOR occurs when an application exposes a reference to an internal implementation object, such as a file, directory, or database key. Example:  Suppose...

Intruder - Battering Ram Attack

Purpose:  The Battering Ram attack type is used when you need to insert the same payload into multiple positions within the same request. This can be useful in scenarios where multiple fields might share the same value or where you want to test how the application handles identical inputs across different parameters. How It Works: Multiple Position Synchronization:  In a Battering Ram attack, the same payload is simultaneously inserted into all the designated positions within the request. Synchronized Input Testing:  This type of attack is beneficial for testing inputs that are expected to be the same or related across different fields. Steps: 1.Capture the Request: Use Burp Suite’s Proxy tab to intercept the login request. For example, the intercepted HTTP POST request might look like this :                                       ...

OWASP Top 10 :Understanding Software and Data Integrity Failures

   What are Software and Data Integrity Failures? Software and Data Integrity Failures refer to issues that compromise the accuracy, consistency, and trustworthiness of software and data. These failures can result from various factors, including malicious attacks, software bugs, or misconfigurations. Key Types of Software and Data Integrity Failures: 1. Input Validation Failures : Occur when the software does not properly validate input data. Examples : Buffer overflows, SQL injection, and cross-site scripting (XSS). 2. Authentication and Authorization Failures : Occur when there are weaknesses in verifying user identities or controlling user permissions. Examples : Broken authentication mechanisms, and improper access controls. 3. Cryptographic Failures : Involve weaknesses or misconfigurations in cryptographic mechanisms. Examples : Use of weak encryption algorithms, and improper key management. 4. Configuration and Deployment Failures : Arise from incorrect software or...