1. RED TEAM Operator: Malware Development Essentials Course

    • Buy now
    • Learn more
  2. Intro and Setup

    • Introduction
    • Development VM Setup
    • RTO-Win10.ova
    • RTO-maldev.zip
    • RTO-maldev-encrypted.zip
    • Shellcodes
  3. Portable Executable

    • PE files - format and structure
    • PE Bear - looking inside
    • Generating EXE vs DLL
    • PE compilation
  4. Droppers

    • Where to store payloads?
    • Storing payloads in code section
    • Data section as a container
    • Payloads in resource section
  5. Obfuscation and Hiding

    • Encoding and Encryption
    • Payload encoding
    • Encrypting payloads - XOR
    • Encrypting payloads - AES
    • Antivirus vs call obfuscation
    • Implementing function call obfuscation
  6. Backdoors and Trojans

    • Backdooring PE theory
    • Making Putty a trojan
  7. Code Injection

    • What is code injection?
    • Injecting code into remote process
    • Implementing code injection
    • Loading DLLs into remote process
    • DLL generator and injector
  8. Extras

    • Making program invisible
  9. Combined Project

    • Dropper overview
    • Dropper implementation
    • Bypassing Windows Defender
    • Assignment
  10. Summary

    • Course closing information
  1. Products
  2. Course
  3. Section

Summary

  1. RED TEAM Operator: Malware Development Essentials Course

    • Buy now
    • Learn more
  2. Intro and Setup

    • Introduction
    • Development VM Setup
    • RTO-Win10.ova
    • RTO-maldev.zip
    • RTO-maldev-encrypted.zip
    • Shellcodes
  3. Portable Executable

    • PE files - format and structure
    • PE Bear - looking inside
    • Generating EXE vs DLL
    • PE compilation
  4. Droppers

    • Where to store payloads?
    • Storing payloads in code section
    • Data section as a container
    • Payloads in resource section
  5. Obfuscation and Hiding

    • Encoding and Encryption
    • Payload encoding
    • Encrypting payloads - XOR
    • Encrypting payloads - AES
    • Antivirus vs call obfuscation
    • Implementing function call obfuscation
  6. Backdoors and Trojans

    • Backdooring PE theory
    • Making Putty a trojan
  7. Code Injection

    • What is code injection?
    • Injecting code into remote process
    • Implementing code injection
    • Loading DLLs into remote process
    • DLL generator and injector
  8. Extras

    • Making program invisible
  9. Combined Project

    • Dropper overview
    • Dropper implementation
    • Bypassing Windows Defender
    • Assignment
  10. Summary

    • Course closing information

1 Lesson
    • Course closing information