RED TEAM Operator: Malware Development Essentials Course
Buy now
Learn more
Intro and Setup
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Portable Executable
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
Where to store payloads?
Storing payloads in code section
Data section as a container
Payloads in resource section
Obfuscation and Hiding
Encoding and Encryption
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Backdoors and Trojans
Backdooring PE theory
Making Putty a trojan
Code Injection
What is code injection?
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
Extras
Making program invisible
Combined Project
Dropper overview
Dropper implementation
Bypassing Windows Defender
Assignment
Summary
Course closing information
Products
Course
RED TEAM Operator: Malware Development Essentials Course
RED TEAM Operator: Malware Development Essentials Course
RED TEAM Operator: Malware Development Essentials Course
Buy now
Learn more
Intro and Setup
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Portable Executable
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
Where to store payloads?
Storing payloads in code section
Data section as a container
Payloads in resource section
Obfuscation and Hiding
Encoding and Encryption
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Backdoors and Trojans
Backdooring PE theory
Making Putty a trojan
Code Injection
What is code injection?
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
Extras
Making program invisible
Combined Project
Dropper overview
Dropper implementation
Bypassing Windows Defender
Assignment
Summary
Course closing information
Learn more
Buy now
A course on becoming a better ethical hacker, pentester and red teamer by learning offensive security tools development in Windows.
Intro and Setup
5 Lessons
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Portable Executable
4 Lessons
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
4 Lessons
Where to store payloads?
Storing payloads in code section
Data section as a container
Payloads in resource section
Obfuscation and Hiding
6 Lessons
Encoding and Encryption
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Backdoors and Trojans
2 Lessons
Backdooring PE theory
Making Putty a trojan
Code Injection
5 Lessons
What is code injection?
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
Extras
1 Lesson
Making program invisible
Combined Project
4 Lessons
Dropper overview
Dropper implementation
Bypassing Windows Defender
Assignment
Summary
1 Lesson
Course closing information