Course Overview

Over the past couple of years, Linux malware has been on the rise. This has created greater interest in studying and analyzing threats against Linux platforms. This course equips you with the knowledge to emulate such threats and to better detect and mitigate them in your Linux environments. The course walks you through developing your own Linux malware with capabilities such as executing shell commands, transferring files, and taking screenshots. You will also learn how to achieve persistence in Linux. Finally, we'll create a custom server in Python to interact with the malware on the target system. The course is relevant to both red teamers and blue teamers; system administrators will also benefit. Red teamers will be better equipped to emulate threats against Linux environments, while blue teamers and system administrators will be better positioned to detect and respond to them. If you're a software engineer interested in hands-on Python practice, this course will help you. Python is used throughout, making the course suitable for Python programming enthusiasts.

What You Will Learn

  • Develop undetectable Linux malware.
  • Develop software using the Go programming language.
  • Understand the internals of modern Linux malware.
  • Understand network programming using Go and Python.

Program Curriculum

  • Demo of the Finished Project
  • $7 Million Cybersecurity Scholarship by EC-Council

  • Environment Setup

  • Project Setup
  • Connecting to C2 Server
  • Receiving Incoming Commands
  • Sending Back Response
  • Closing/Terminating the Connection
  • Changing Directories
  • File Transfer
  • Uploading File to Machine
  • Downloading File from Machine
  • Minor Bug Fixes
  • Taking a Screenshot
  • Achieving Persistence
  • Executing Shell Commands
  • Testing with Netcat
  • Chapter 3 Quiz

  • Project Setup
  • Creating a Listener
  • Accepting Incoming Connections
  • Loop to Receive Attacker's Commands
  • Handling the q/quit Command
  • Receiving and Saving Screenshot
  • File Download
  • File Upload
  • Shell Commands
  • Testing with Our RAT
  • Chapter 4 Quiz

Next Steps

Load more modules

Instructor

Nemuel Wainaina

Nemuel is a security researcher with over 4 years of tinkering with computers and electronics. Having developed an interest in hacking at the young age of 14, he has quickly been able to learn and dive deeper into advanced concepts of exploit and malware development. He has got to develop a variety of security tools ranging from simple keyloggers to advanced proof-of-concept malware like ransomware and spyware for Linux platforms. Besides cyber security, Nemuel is a software engineer with a focus on designing and building maintainable and scalable backend systems mainly using the Go programming language.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering video-based learning with 840+ courses and diverse Learning Paths to enhance your skills.

$ 69.00
Billed monthly or $599.00 billed annually

What is included

  • 840+ Premium Short Courses
  • 70+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs and CTF Challenges for comprehensive skill-building.

$ 79.00
Billed monthly or $699.00 billed annually

Everything in Pro and

  • 1400+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month

Related Courses

1 of 50