Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for covert intelligence gathering software in this 52-minute conference talk. Delve into implemented solutions for common requirements, including anti-virus evasion, anti-attribution, covert channels, C2 protection, administration, scaling, persistence, and counter-intelligence. Gain insights into which tactics work from a methodological and human perspective, with specific mappings to technical capabilities. Examine full source code snippets, primarily in Golang, and practical examples addressing various roadblocks in covert operations. Learn from the presenter's extensive experience in offensive security, covering topics such as reverse engineering, penetration testing, malware development, and long-term electronic surveillance.