Navigation X

Bookmark Mirror Link https://leakforum.st (May 16) x

https://leakforum.io/images/care/like.gifhttps://leakforum.io/images/care/like.gif

Sektor7 - Malware Development Intermediate Course

posted by Sauron and Last Post: 1 day ago


Sektor7 - Malware Development Intermediate Course  1616
Sauron The Ban Hammer
3.047
Posts
2.972
Threads
The Ban Hammer
#1
[Image: Screenshot-4.png]Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.

This course builds on what you have learned so far by extending your development capabilities with:
  • playing with Process Environment Blocks and implementing our own function address resolution
  • more advanced code injection techniques
  • understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
  • in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
  • grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
  • discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn
  • What is PEB and how function address resolution works
  • What are other code injection techniques
  • How to build custom reflective binary
  • How to hook APIs in memory
  • How to migrate between 32- and 64-bit processes
  • How to use IPC to control your payloads
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Essentials course
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics


Hidden Content
You must register or login to view this content.

[Image: 330x192.gif]
  Reply
del1ja500 Member
73
Posts
0
Threads
Member
#2
thanks man, very good resource!
Reply
fatsmatrat Junior Member
3
Posts
0
Threads
Junior Member
#3
thanks
Reply
xali1996 Member
13
Posts
0
Threads
Member
#4
appreciate it man
Reply
darhud2002 Junior Member
5
Posts
0
Threads
Junior Member
#5
(6 months ago)Sauron Wrote:
[Image: Screenshot-4.png]Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.

This course builds on what you have learned so far by extending your development capabilities with:
  • playing with Process Environment Blocks and implementing our own function address resolution
  • more advanced code injection techniques
  • understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
  • in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
  • grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
  • discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn
  • What is PEB and how function address resolution works
  • What are other code injection techniques
  • How to build custom reflective binary
  • How to hook APIs in memory
  • How to migrate between 32- and 64-bit processes
  • How to use IPC to control your payloads
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Essentials course
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics

thank u
Reply
Fargelda Junior Member
8
Posts
0
Threads
Junior Member
#6
(6 months ago)Sauron Wrote:
[Image: Screenshot-4.png]Welcome to Malware Development Intermediate course!In our previous Essentials course we discussed basic steps to create a custom dropper.

This course builds on what you have learned so far by extending your development capabilities with:
  • playing with Process Environment Blocks and implementing our own function address resolution
  • more advanced code injection techniques
  • understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
  • in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
  • grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
  • discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn
  • What is PEB and how function address resolution works
  • What are other code injection techniques
  • How to build custom reflective binary
  • How to hook APIs in memory
  • How to migrate between 32- and 64-bit processes
  • How to use IPC to control your payloads
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Essentials course
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics



Thx for this
Reply
Cr0cki0g0 Banned
114
Posts
0
Threads
Banned
#7
Malware Development
Reply
dielianhua Member
24
Posts
0
Threads
Member
#8
god bless you,my good man
Reply
UnknownRat Junior Member
8
Posts
1
Threads
Junior Member
#9
Im loving all the free courses. thank you
Reply
Palimos Junior Member
7
Posts
0
Threads
Junior Member
#10
Please don't leave it help everyone then I'm poor but thank you
Reply

https://leakforum.io/images/care/like.gif

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)