1,354
Posts
1,331
Threads
Moderator
Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.
This course builds on what you have learned so far by extending your development capabilities with:- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
What Will You Get?- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
Requirements- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics
Hidden Content
You must register or login to view this content.
thanks man, very good resource!
(3 months ago)Sauron Wrote: Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.
This course builds on what you have learned so far by extending your development capabilities with:- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
What Will You Get?- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
Requirements- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics
thank u
(3 months ago)Sauron Wrote: Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.
This course builds on what you have learned so far by extending your development capabilities with:- playing with Process Environment Blocks and implementing our own function address resolution
- more advanced code injection techniques
- understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
- in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
- grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
- discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.
You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.COURSE IN A NUTSHELLYou Will Learn- What is PEB and how function address resolution works
- What are other code injection techniques
- How to build custom reflective binary
- How to hook APIs in memory
- How to migrate between 32- and 64-bit processes
- How to use IPC to control your payloads
What Will You Get?- Full-blown videos explaining all techniques in detail
- Transcription with English subtitles
- Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
- Source code with code templates for rapid development
- VM image with ready-to-use development environment
Requirements- Recommended: taking Malware Development Essentials course
- Understanding of operating system architecture
- Some experience with Windows OS
- Computer with min. 4 GB of RAM + 30 GB of free disk space
- VirtualBox 7.0+ installed
- Strong will to learn and having fun
Target Audience- Ethical Hackers
- Penetration Testers
- Blue Teamers
- Threat Hunters
- All security engineers/professionals wanting to learn advanced offensive tactics
Thx for this
|