Navigation X

Bookmark Mirror Link https://leakforum.st (May 16) x

https://leakforum.io/images/care/like.gifhttps://leakforum.io/images/care/like.gif

Sektor7 - RED TEAM Operator: Malware Development Advanced - Vol.1

posted by Sauron and Last Post: 14 days ago


Sektor7 - RED TEAM Operator: Malware Development Advanced - Vol.1  694
Sauron Moderator
2,322
Posts
2,264
Threads
Moderator
#1



[Image: Screenshot-3.png]

Welcome to Malware Development Advanced (Vol.1) course!
In the previous Intermediate course we covered some of the more advanced offensive security tools (OST) development topics.

This time we will be focusing on extending your payload with additional userland techniques to bury it in the depths of the system. That includes:
  • ways to hide your payload inside NTFS and registry hive
  • learning object enumeration alternatives in the system memory
  • manipulating Process Environment Blocks to hide your module and confuse the potential defender
  • finding .NET process with RWX memory ready to abuse
  • detecting new process creation (from userland)
  • setting up global hooks
  • learning few userland rootkit techniques to hide your files, registry keys and processes
  • abusing memory and hardware breakpoints for hooking
  • hiding payload with Gargoyle and similar techniques
  • creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
  • learning COFF objects, how to build, parse, load and execute them in the memory
The course ends with a custom project, employing some of the discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn How To
  • Hide payloads in the corners of NTFS and registry
  • Enumerate processes, modules and handles with alternatives
  • Find a perfect process for injection
  • Set up global hooks
  • Use few userland rootkit techniques
  • Abuse exception handlers
  • Hide a payload in a memory
  • Call any API (with any number of params) in a remote process
  • Build custom COFF objects
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Intermediate course
  • Solid understanding of operating system architecture
  • Good experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics
Hidden Content
You must register or login to view this content.

[Image: tumblr-b540b318feeef992063cb2e5ff500a57-...resize.gif]
Reply
del1ja500 Member
43
Posts
0
Threads
Member
#2
ty for the resource
Reply
flirtbird Junior Member
1
Posts
0
Threads
Junior Member
#3
lifesaver!
Reply
darhud2002 Junior Member
5
Posts
0
Threads
Junior Member
#4
(4 months ago)Sauron Wrote:



[Image: Screenshot-3.png]
Welcome to Malware Development Advanced (Vol.1) course!
In the previous Intermediate course we covered some of the more advanced offensive security tools (OST) development topics.

This time we will be focusing on extending your payload with additional userland techniques to bury it in the depths of the system. That includes:
  • ways to hide your payload inside NTFS and registry hive
  • learning object enumeration alternatives in the system memory
  • manipulating Process Environment Blocks to hide your module and confuse the potential defender
  • finding .NET process with RWX memory ready to abuse
  • detecting new process creation (from userland)
  • setting up global hooks
  • learning few userland rootkit techniques to hide your files, registry keys and processes
  • abusing memory and hardware breakpoints for hooking
  • hiding payload with Gargoyle and similar techniques
  • creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
  • learning COFF objects, how to build, parse, load and execute them in the memory
The course ends with a custom project, employing some of the discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn How To
  • Hide payloads in the corners of NTFS and registry
  • Enumerate processes, modules and handles with alternatives
  • Find a perfect process for injection
  • Set up global hooks
  • Use few userland rootkit techniques
  • Abuse exception handlers
  • Hide a payload in a memory
  • Call any API (with any number of params) in a remote process
  • Build custom COFF objects
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Intermediate course
  • Solid understanding of operating system architecture
  • Good experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics
 
thank u
Reply
Fargelda Junior Member
6
Posts
0
Threads
Junior Member
#5
(4 months ago)Sauron Wrote:



[Image: Screenshot-3.png]

Welcome to Malware Development Advanced (Vol.1) course!
In the previous Intermediate course we covered some of the more advanced offensive security tools (OST) development topics.

This time we will be focusing on extending your payload with additional userland techniques to bury it in the depths of the system. That includes:
  • ways to hide your payload inside NTFS and registry hive
  • learning object enumeration alternatives in the system memory
  • manipulating Process Environment Blocks to hide your module and confuse the potential defender
  • finding .NET process with RWX memory ready to abuse
  • detecting new process creation (from userland)
  • setting up global hooks
  • learning few userland rootkit techniques to hide your files, registry keys and processes
  • abusing memory and hardware breakpoints for hooking
  • hiding payload with Gargoyle and similar techniques
  • creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
  • learning COFF objects, how to build, parse, load and execute them in the memory
The course ends with a custom project, employing some of the discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELLYou Will Learn How To
  • Hide payloads in the corners of NTFS and registry
  • Enumerate processes, modules and handles with alternatives
  • Find a perfect process for injection
  • Set up global hooks
  • Use few userland rootkit techniques
  • Abuse exception handlers
  • Hide a payload in a memory
  • Call any API (with any number of params) in a remote process
  • Build custom COFF objects
What Will You Get?
  • Full-blown videos explaining all techniques in detail
  • Transcription with English subtitles
  • Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
  • Source code with code templates for rapid development
  • VM image with ready-to-use development environment
Requirements
  • Recommended: taking Malware Development Intermediate course
  • Solid understanding of operating system architecture
  • Good experience with Windows OS
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 7.0+ installed
  • Strong will to learn and having fun
 
Target Audience
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics

Thx for this!
Reply
Cr0cki0g0 Member
104
Posts
0
Threads
Member
#6
engineers/professionals wanting to learn advanced offensive tactics
Reply
dielianhua Member
24
Posts
0
Threads
Member
#7
thanks for you
Reply
SSSnowl Junior Member
1
Posts
0
Threads
Junior Member
#8
thanks
Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 2 Guest(s)