Created by
0.00 Star (0)
1 Hours
0 Lesson
Over the past couple years, Linux malware has been on the rise . This has created a greater interest in studying and analyzing such threats against Linux platforms . This course aims to equip you with the knowledge to not only emulate such threats, but also be in a better position to detect and mitigate them from your Linux environments .
This course will take you through developing your very own Linux malware with capabilities like executing shell commands, file transfer and taking screenshots . You will also learn how to achieve persistence in Linux . Finally, we will create our own custom server using the Python programming language . The server is what we will be using to interact with the malware on the target system .
That makes the course therefore relevant to both red teamers and blue teamers . System administrators will also benefit from the course . Red teamers will be better equipped to emulate such threats against Linux environments, while blue teamers and system administrators alike will be in a better position to detect and properly respond to such threats .
Also, if you are a software engineer interested in more hands-on learning about the programming language, this course will definitely help you with that . Python is also used, and this makes the course also suit python programming enthusiasts .
WARNING: This course is provided strictly for educational, ethical, and defensive cybersecurity training purposes only.
The techniques, code, tools, and concepts demonstrated in this course are intended to be used only in controlled lab environments, on systems you own, or on systems where you have received clear written authorization to perform security testing.
DragonZap Ltd, its employees, instructors, directors, contractors, and affiliates do not condone, encourage, support, or authorize any illegal activity, unauthorized access, malware deployment, data theft, service disruption, persistence on third-party systems, or misuse of the material taught in this course.
By enrolling in or accessing this course, you agree that you are solely responsible for how you use the information provided. You must comply with all applicable laws, regulations, policies, and terms of service in your jurisdiction.
DragonZap Ltd accepts no responsibility or liability for any loss, damage, legal consequences, or misuse arising from the application of the knowledge, tools, code, or techniques covered in this course.
This course is designed to help security professionals, system administrators, developers, red teamers, and blue teamers better understand Linux malware behavior so they can improve detection, mitigation, response, and defensive security practices.
Basic to intermediate programming experience in any programming language
An understanding of how to use the Linux terminal
Anyone interested in understanding how to develop malware using Go
Red Teamers interested in using Go to create their malware
Blue Teamers interested in understanding the internals of malware threats against Linux environments
Go and Python developers interested in an exciting project
Introduction
2 Lessons
0H 5M
1m 57s
4m 2s
Getting Started
1 Lessons
0H 1M
1m 48s
Developing the RAT
14 Lessons
0H 49M
4m 6s
3m 31s
1m 57s
4m 24s
1m 14s
7m 2s
2m 48s
2m 56s
Developing the Server
10 Lessons
0H 25M
1m 46s
2m 15s
3m 12s
4m 48s
1m 13s
4m 35s
Conclusion
1 Lessons
0H 1M
1m 7s
Full Lifetime Access
30 Days Money Back Guarantee
Free Exercises File
Watch online or offline
Certificate of Completion
Ashraf S.A Almadhoun
Metla Sudha Sekhar
Metla Sudha Sekhar