Whether you’re a seasoned security engineer, operator, or analyst or you’re just getting started in the offensive security community learning to develop your own tools can save money while enhancing your skill set.
Learning to develop your own backdoor will help propel you towards more advanced techniques like antivirus evasion, undetected migration, convert persistence, and module integration.
This is a hands-on course that walks students through the development of a backdoor and its integration with JediMammoth and Metasploit.
In this course, you will learn
• Introduction to the exploitation lifecycle
• US & Foreign Hacking regulations and Offensive Security regulations
• How to write your own backdoor
• Integration with JediMammoth
• Integration with Metasploit by initiating a meterpreter session
• Writing modules to run native commands, transfer files, and implement persistence techniques
• How to use your backdoor with an exploit in Metasploit
• Implement disk & data transfer encryption
• Run NMAP scan from your backdoor
• Initiation SMB BruteForce
• Session Logging
• Compiling with Pyinstaller
Who Should Attend
Additionally, anyone wishing to acquire more specialized knowledge for working with (or within) technology/offensive security startups will also benefit. This might include:
• Offensive Security Operators
• Incident Response Engineers
• Network Administrators
• Engineers
• Coders
• Data Scientists
Dates and Times
2 – 8-hour sessions on developing backdoors in python
June 16th & 17th 9:00 AM – 5:00 PM
Cost: $749 person
Early Registration Savings: Register by May 1 and Save $250
Register here: https://academy.davinciinstitute.com/backdoors-with-python/
Phone: 303-666-4133