YoVDO

Pages from a Sword-Maker's Notebook Part II

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Reverse Engineering Courses Penetration Testing Courses Incident Response Courses Offensive Security Courses

Course Description

Overview

Explore advanced techniques for covert intelligence gathering software in this 52-minute conference talk. Delve into implemented solutions for common requirements, including anti-virus evasion, anti-attribution, covert channels, C2 protection, administration, scaling, persistence, and counter-intelligence. Gain insights into which tactics work from a methodological and human perspective, with specific mappings to technical capabilities. Examine full source code snippets, primarily in Golang, and practical examples addressing various roadblocks in covert operations. Learn from the presenter's extensive experience in offensive security, covering topics such as reverse engineering, penetration testing, malware development, and long-term electronic surveillance.

Syllabus

Pages from a Sword-Maker's Notebook pt. II - Vyrus


Taught by

0xdade

Related Courses

Basics of Network Security
Coventry University via FutureLearn
Offensive Security Engineering
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy
Hack Like a Pro - Ethical Hacking from A to Z
Udemy
Exfiltration with Dnscat2
Pluralsight