Live Webcast

Evading Anti-virus Detection with Metasploit

  •  

To register for this live webcast, fill out the form below!

In this technical webinar for penetration testers, David Maloney discusses how to evade anti-virus detection on target machines to avoid detection. Participants will learn about:

  • Signatures, heuristics, and sandboxes
  • Single and stages payloads
  • Executable templates
  • Common misconceptions about encoding payloads
  • Dynamically creating executable templates

Date/Time:

Thursday January 24th at 2:00PM ET

Speaker:

David Maloney, Software Engineer, Rapid7

David "thelightcosine" Maloney is a Software Engineer on Rapid7’s Metasploit team, where he is responsible for development of core features for the commercial Metasploit editions. Before Rapid7, he worked as a Security Engineer and Penetration Tester at Time Warner Cable and as an Application Security Specialist for a global insurance company. David has been a long-time community contributor to the Metasploit Framework. He is also a member of the Corelan Security Team. He is one of the founders of Hackerspace Charlotte and is an avid locksport enthusiast.