This talk will be a primmer on the golang runtime engine, with a specific focus on the memory protection functionalities present within both the historical, and current contexts of the golang language. Beyond a primmer on the protections applied by runtime at various stages of the language's maturity, this talk will also focus on bypass strategies for performing memory execution based tasks, such as calling shellcode.
NOTE: The speaker was not able to make it to BSides in person, so this talk will be given remotely via WebEx.