• We just launched and are currently in beta. Join us as we build and grow the community.

Sektor7 - Malware Development Advanced - Vol.1

smartsetapp

Binary Optimization Specialist
S Rep
0
0
0
Rep
0
S Vouches
0
0
0
Vouches
0
Posts
153
Likes
60
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP



[color=rgb(84,]Welcome to Malware Development Advanced (Vol.1) course![/color]

[color=rgb(97,]ways to hide your payload inside NTFS and registry hive :[/color]
[/center]
[list]
[*][color=rgb(147,]
[center]
learning object enumeration alternatives in the system memory
[/center]
[/color]
[*][color=rgb(147,]
[center]
manipulating Process Environment Blocks to hide your module and confuse the potential defender
[/center]
[/color]
[*][color=rgb(147,]
[center]
finding .NET process with RWX memory ready to abuse
[/center]
[/color]
[*][color=rgb(147,]
[center]
detecting new process creation (from userland)
[/center]
[/color]
[*][color=rgb(147,]
[center]
setting up global hooks
[/center]
[/color]
[*][color=rgb(147,]
[center]
learning few userland rootkit techniques to hide your files, registry keys and processes
[/center]
[/color]
[*][color=rgb(147,]
[center]
abusing memory and hardware breakpoints for hooking
[/center]
[/color]
[*][color=rgb(147,]
[center]
hiding payload with Gargoyle and similar techniques
[/center]
[/color]
[*][color=rgb(147,]
[center]
creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
[/center]
[/color]
[*][color=rgb(147,]
[center]
learning COFF objects, how to build, parse, load and execute them in the memory
[/center]
[/color]
[/list]

[center]
[color=rgb(184,]The course ends with a custom project, employing some of the discussed techniques.[/color]

[color=rgb(251,]You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.[/color]

[color=rgb(84,]COURSE IN A NUTSHELL[/color]

[color=rgb(97,]You Will Learn How To :[/color]
[/center]
[list]
[*][color=rgb(147,]
[center]
Hide payloads in the corners of NTFS and registry
[/center]
[/color]
[*][color=rgb(147,]
[center]
Enumerate processes, modules and handles with alternatives
[/center]
[/color]
[*][color=rgb(147,]
[center]
Find a perfect process for injection
[/center]
[/color]
[*][color=rgb(147,]
[center]
Set up global hooks
[/center]
[/color]
[*][color=rgb(147,]
[center]
Use few userland rootkit techniques
[/center]
[/color]
[*][color=rgb(147,]
[center]
Abuse exception handlers
[/center]
[/color]
[*][color=rgb(147,]
[center]
Hide a payload in a memory
[/center]
[/color]
[*][color=rgb(147,]
[center]
Call any API (with any number of params) in a remote process
[/center]
[/color]
[*][color=rgb(147,]
[center]
Build custom COFF objects
[/center]
[/color]
[/list]

[center]
[color=rgb(97,]What Will You Get ?[/color]
[/center]
[list]
[*][color=rgb(147,]
[center]
Full-blown videos explaining all techniques in detail
[/center]
[/color]
[*][color=rgb(147,]
[center]
Transcription with English subtitles
[/center]
[/color]
[*][color=rgb(147,]
[center]
Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
[/center]
[/color]
[*][color=rgb(147,]
[center]
Source code with code templates for rapid development
[/center]
[/color]
[*][color=rgb(147,]
[center]
VM image with ready-to-use development environment
[/center]
[/color]
[/list]

[center]
[color=rgb(97,]Requirements :[/color]
[/center]
[list]
[*][color=rgb(147,]
[center]
Recommended: taking https://institute.sektor7.net/rto-maldev-intermediate course
[/center]
[/color]
[*][color=rgb(147,]
[center]
Solid understanding of operating system architecture
[/center]
[/color]
[*][color=rgb(147,]
[center]
Good experience with Windows OS
[/center]
[/color]
[*][color=rgb(147,]
[center]
Computer with min. 4 GB of RAM + 30 GB of free disk space
[/center]
[/color]
[*][color=rgb(147,]
[center]
VirtualBox 7.0+ installed
[/center]
[/color]
[*][color=rgb(147,]
[center]
Strong will to learn and having fun
[/center]
[/color]
[/list]

[center]
[color=rgb(97,]Target Audience :[/color]
[/center]
[list]
[*][color=rgb(147,]
[center]
Ethical Hackers
[/center]
[/color]
[*][color=rgb(147,]
[center]
Penetration Testers
[/center]
[/color]
[*][color=rgb(147,]
[center]
Blue Teamers
[/center]
[/color]
[*][color=rgb(147,]
[center]
Threat Hunters
[/center]
[/color]
[*][color=rgb(147,]
[center]
All security engineers/professionals wanting to learn advanced offensive tactics
[/center]
[/color]
[/list]

[center]
[color=rgb(250,]Download Link:[/color]


https://pixeldrain.com/u/1nSG8sfb
[/center]​
 

434,910

313,635

313,644

Top