On-Demand Webcast

Evading Anti-virus Detection with Metasploit

In this technical webinar for penetration testers, David Maloney discusses how to evade anti-virus detection on target machines to avoid detection. Participants will learn about:

  • Signatures, heuristics, and sandboxes
  • Single and stages payloads
  • Executable templates
  • Common misconceptions about encoding payloads
  • Dynamically creating executable templates


David Maloney, Software Engineer, Rapid7

David "thelightcosine" Maloney is a Software Engineer on Rapid7’s Metasploit team, where he is responsible for development of core features for the commercial Metasploit editions. Before Rapid7, he worked as a Security Engineer and Penetration Tester at Time Warner Cable and as an Application Security Specialist for a global insurance company. David has been a long-time community contributor to the Metasploit Framework. He is also a member of the Corelan Security Team. He is one of the founders of Hackerspace Charlotte and is an avid locksport enthusiast.