c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...
How are NSA-style stealth backdoors engineered to persist inside enterprise environments without triggering detection?
This three-day, hands-on red team workshop walks you through building that capability end-to-end. Day one focuses on designing stealth infrastructure that operates behind enterprise defenses, enabling controlled interception and long-term operations. Day two shifts to identity compromise, where you execute live MFA interception, ClickFix and ConsentFix attacks, and run full identity attack chains across Multi-Cloud.
On day three, you build and understand an NSA-style stealth backdoor, focusing on fileless execution, persistence inside trusted Windows processes, and operating without traditional outbound beaconing. The emphasis is on how modern tradecraft minimizes detection surface while maintaining reliable control inside target environments.
Every technique is grounded in real-world adversary playbooks, providing a practical understanding of how identity, cloud, and endpoint layers are abused together in modern operations.
Build the backdoor. Own the identity. Leave no trace.
A laptop with the following specifications:
Minimum 3 to 4 years in penetration testing or a related security domain.