Sale!

RED TEAM Operator: Malware Development Intermediate Course

Original price was: $26.00.Current price is: $9.00.

  • Sale Price: $10
  • Regular Price: $29
  • Size: 1.60 GB
  • Duration: 6 hours 36 minutes
  • Number of Video Lessons: 27
  • Brand:
  • Language: English
  • Instant Download
  • ⭐️⭐️⭐️⭐️⭐️ 4.9

Description

RED TEAM Operator: Malware Development Intermediate Course

More advanced offensive security tools (OST) development techniques in Windows, including: API hooking, 32-/64-bit migrations, reflective binaries and more.

 

Welcome to Malware Development Intermediate course!
In our previous Essentials course we discussed basic steps to create a custom dropper.

This course builds on what you have learned so far by extending your development capabilities with:
playing with Process Environment Blocks and implementing our own function address resolution
more advanced code injection techniques
understanding how reflective binaries work and building custom reflective DLLs, either with source or binary only
in-memory hooking, capturing execution flow to block, monitor or evade functions of interest
grasping 32- and 64-bit processing and performing migrations between x86 and x64 processes
discussing inter process communication and how to control execution of multiple payloads
The course ends with a combined project, where you will create a custom dropper implementing discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.
COURSE IN A NUTSHELL

You Will Learn
What is PEB and how function address resolution works
What are other code injection techniques
How to build custom reflective binary
How to hook APIs in memory
How to migrate between 32- and 64-bit processes
How to use IPC to control your payloads

What Will You Get?
Full-blown videos explaining all techniques in detail
Transcription with English subtitles
Text supplements with additional information (code snipets, structure definitions, technology description and context, etc.)
Source code with code templates for rapid development
VM image with ready-to-use development environment

Requirements
Recommended: taking Malware Development Essentials course
Understanding of operating system architecture
Some experience with Windows OS
Computer with min. 4 GB of RAM + 30 GB of free disk space
VirtualBox 6.0+ installed
Strong will to learn and having fun

Target Audience
Ethical Hackers
Penetration Testers
Blue Teamers
Threat Hunters
All security engineers/professionals wanting to learn advanced offensive tactics


Discover more from Easy Learning (Since 2013)

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.