Navigation X

Bookmark Mirror Link https://leakforum.st (May 16) x

https://leakforum.io/images/care/like.gif https://leakforum.io/images/care/like.gif

Advanced Malware Techniques

posted by Sauron and Last Post: 1 month ago


Advanced Malware Techniques  253
Sauron Retired
3.013
Posts
2.938
Threads
Retired
#1
[Image: Screenshot-from-2025-05-23-15-12-32.png]Requirements
  • Programming in C/C++ and Assembly
  • Computer Networks
  • Operating Systems (Windows more specifically)
DescriptionIn this course, I will show advanced techniques used by real malware that I have already analyzed. In practice, Analyzing malware is not that easy. First, finding a good sample is a bit tedious and, depending on the techniques and number of stages, it can take a long time. I will also be adding content related to offensive security focused on red team operations in which I have already participated, talking about infrastructure, networks, organization and computer architecture applied to this.
The course covers advanced cryptography techniques, protocol customization, process injection techniques, obfuscation, how to abuse internal Windows mechanisms to elevate privileges and escape defenses, programming command and control servers for exfiltration in multiple protocols, polymorphism and programming malware in multiple stages for each "nature" of malware, such as ransomware, worms, stealers, etc...
I would like to emphasize that this course is for more technical users who already have an idea about the topics covered, however, the main objective is to arouse a certain curiosity for research on the topics as well.
My microphone is also not one of the best, so if a class is poorly explained in a technical way or has very very very bad audio, please do not hesitate to comment so that I can re-record it, unfortunately I do not have much time for video editing, but the idea is to be technical and objective. I hope you enjoy the content, I will be doing my best.
Who this course is for:
  • People who work with Information Security
Hidden Content
You must register or login to view this content.

Yaya Until Further Notice I Am Retired Yaya
Reply
swibby Junior Member
3
Posts
0
Threads
Junior Member
#2
(1 month ago)Sauron Wrote:
[Image: Screenshot-from-2025-05-23-15-12-32.png]Requirements
  • Programming in C/C++ and Assembly
  • Computer Networks
  • Operating Systems (Windows more specifically)
DescriptionIn this course, I will show advanced techniques used by real malware that I have already analyzed. In practice, Analyzing malware is not that easy. First, finding a good sample is a bit tedious and, depending on the techniques and number of stages, it can take a long time. I will also be adding content related to offensive security focused on red team operations in which I have already participated, talking about infrastructure, networks, organization and computer architecture applied to this.
The course covers advanced cryptography techniques, protocol customization, process injection techniques, obfuscation, how to abuse internal Windows mechanisms to elevate privileges and escape defenses, programming command and control servers for exfiltration in multiple protocols, polymorphism and programming malware in multiple stages for each "nature" of malware, such as ransomware, worms, stealers, etc...
I would like to emphasize that this course is for more technical users who already have an idea about the topics covered, however, the main objective is to arouse a certain curiosity for research on the topics as well.
My microphone is also not one of the best, so if a class is poorly explained in a technical way or has very very very bad audio, please do not hesitate to comment so that I can re-record it, unfortunately I do not have much time for video editing, but the idea is to be technical and objective. I hope you enjoy the content, I will be doing my best.
Who this course is for:
  • People who work with Information Security

Reply
ladenisko Junior Member
2
Posts
0
Threads
Junior Member
#3
will see
Reply
del1ja500 Member
73
Posts
0
Threads
Member
#4
thanks man
Reply
Cr0cki0g0 Banned
114
Posts
0
Threads
Banned
#5
Advanced Malware Techniques
Reply
Vickzb Junior Member
5
Posts
0
Threads
Junior Member
#6
good to learn, thank u
Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)