Backdoors with Python
Coding for Cybersecurity – A priority in both the public and private sectors
Today, technology impacts every part of our lives. It’s equally important that it is available, protected and secure as we interact with it on a daily basis. And, if you’re a seasoned security engineer, operator or analyst you’re aware of the value in developing your own cyber security tools. Even if you’re just starting out in the field, you’ll learn the value of this skill set which not only saves money but also provides you with a competitive advantage in the field.
We’ll start by working with you to develop your own back door (allowing you to access the software for troubleshooting and other purposes) and then move into more advanced techniques including antivirus evasion, undetected migration, convert persistence, and module integration.
This is a hands-on course that will walk you through this backdoor development in a simple step-by-step approach and then take you all the way to its integration with JediMammoth and Metasploit.
In this course, we will cover:
- An introduction to the exploitation lifecycle
- Both US and foreign hacking regulations and offensive security regulations
- How to write your own backdoor
- Integration with JediMammoth
- Integration with Metasploit by initiating a meterpreter session
- Writing modules to run native commands, transfer files, and implement persistence techniques
- How to use your backdoor with an exploit in Metasploit
- Implement disk & data transfer encryption
- Run NMAP scan from your backdoor
- Initiation SMB BruteForce
- Session Logging
- Compiling with Pyinstaller
Who Should Attend
Additionally, anyone wishing to acquire more specialized knowledge for working with (or within) technology/offensive security startups will also benefit. This includes:
- Offensive Security Operators
- Incident Response Engineers
- Network Administrators
- Data Scientists
About the Instructor
D.L. Evenden is an experienced offensive security operator/analyst with 10 years of active work experience inside the Intelligence Community (IC). During his time inside the IC, he learned Persian Farsi, worked at NSA Red Team and was a member of an elite international team operating in conjunction with coalition forces to aid in the ongoing efforts in the Middle East.
While he currently works with an ISP and DHS to aid in the efforts to enhance the bidirectional sharing relationship between the US Government and Commercial entities, his passion is educating network administrators and security engineers on best practices when securing your network.
Dates and Times
2 – 8-hour sessions on developing backdoors in python
June 16th & 17th 9:00 AM – 5:00 PM