1. This is a free service provided by Fyodor, the creator of Nmap, but when you’re scanning, be polite. He requests, “Try not to hammer on the server too hard. A few scans in a day is fine, but don’t scan 100 times a day.”
1. For assistance and practice with exploitation, consider downloading and running the Metasploitable virtual image, which contains several exploitable flaws useful for training purposes.
1. Go versions 1.9 and newer contain a concurrent-safe type, sync.Map, that may be used to simplify your code.
1. For more detailed information about this vulnerability, refer to https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jboss.
1. Some operating modes, such as Galois/Counter Mode (GCM), provide integrity assurance.