Pages from a Sword-Maker's Notebook Part II
Offered By: 0xdade via YouTube
Course Description
Overview
Explore advanced techniques for covert intelligence gathering software in this 52-minute conference talk. Delve into implemented solutions for common requirements, including anti-virus evasion, anti-attribution, covert channels, C2 protection, administration, scaling, persistence, and counter-intelligence. Gain insights into which tactics work from a methodological and human perspective, with specific mappings to technical capabilities. Examine full source code snippets, primarily in Golang, and practical examples addressing various roadblocks in covert operations. Learn from the presenter's extensive experience in offensive security, covering topics such as reverse engineering, penetration testing, malware development, and long-term electronic surveillance.
Syllabus
Pages from a Sword-Maker's Notebook pt. II - Vyrus
Taught by
0xdade
Related Courses
Basics of Network SecurityCoventry University via FutureLearn Offensive Security Engineering
Udemy Hands-on Penetration Testing Labs 4.0
Udemy Hack Like a Pro - Ethical Hacking from A to Z
Udemy Exfiltration with Dnscat2
Pluralsight