3,013
Posts
2,938
Threads
Retired
Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.
This course builds on what you have learned so far by extending your development capabilities with:- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
What Will You Get?- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
Requirements- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics
Hidden Content
You must register or login to view this content.
Until Further Notice I Am Retired 
thanks man, very good resource!
(6 months ago)Sauron Wrote: Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.
This course builds on what you have learned so far by extending your development capabilities with:- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
What Will You Get?- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
Requirements- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics
thank u
(6 months ago)Sauron Wrote: Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.
This course builds on what you have learned so far by extending your development capabilities with:- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
What Will You Get?- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
Requirements- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics
Thx for this
god bless you,my good man
Im loving all the free courses. thank you
Please don't leave it help everyone then I'm poor but thank you
|