YoVDO

Pages from a Sword-Maker's Notebook Part II

Offered By: 0xdade via YouTube

Tags

ShmooCon Courses Reverse Engineering Courses Penetration Testing Courses Incident Response Courses Offensive Security Courses

Course Description

Overview

Explore advanced techniques for covert intelligence gathering software in this 52-minute conference talk. Delve into implemented solutions for common requirements, including anti-virus evasion, anti-attribution, covert channels, C2 protection, administration, scaling, persistence, and counter-intelligence. Gain insights into which tactics work from a methodological and human perspective, with specific mappings to technical capabilities. Examine full source code snippets, primarily in Golang, and practical examples addressing various roadblocks in covert operations. Learn from the presenter's extensive experience in offensive security, covering topics such as reverse engineering, penetration testing, malware development, and long-term electronic surveillance.

Syllabus

Pages from a Sword-Maker's Notebook pt. II - Vyrus


Taught by

0xdade

Related Courses

Chip Decapping on a Budget
0xdade via YouTube
Adventures in Hardware Hacking or Building Expensive Tools on a Budget
0xdade via YouTube
Whitelisting LD PRELOAD for Fun and No Profit
0xdade via YouTube
5G Protocol Vulnerabilities and Exploits
0xdade via YouTube
Real World Zero Trust Implementation
0xdade via YouTube