YoVDO

Pages from a Sword-Maker's Notebook Part II

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Reverse Engineering Courses Penetration Testing Courses Incident Response Courses Offensive Security Courses

Course Description

Overview

Explore advanced techniques for covert intelligence gathering software in this 52-minute conference talk. Delve into implemented solutions for common requirements, including anti-virus evasion, anti-attribution, covert channels, C2 protection, administration, scaling, persistence, and counter-intelligence. Gain insights into which tactics work from a methodological and human perspective, with specific mappings to technical capabilities. Examine full source code snippets, primarily in Golang, and practical examples addressing various roadblocks in covert operations. Learn from the presenter's extensive experience in offensive security, covering topics such as reverse engineering, penetration testing, malware development, and long-term electronic surveillance.

Syllabus

Pages from a Sword-Maker's Notebook pt. II - Vyrus


Taught by

0xdade

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam