RTO: Malware Development Essentials
Buy now
Learn more
Intro and Setup
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Shellcodes
Portable Executable
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
Storing payloads in code section
Data section as a container
Payloads in resource section
Where to store payloads?
Obfuscation and Hiding
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Encoding and Encryption
Backdoors and Trojans
Backdooring PE theory
Making Putty a trojan
Code Injection
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
What is code injection?
Extras
Making program invisible
Combined Project
Dropper implementation
Bypassing Windows Defender
Assignment
Dropper overview
Summary
Your Feedback
Course closing information
Products
Course
Section
Combined Project
Combined Project
RTO: Malware Development Essentials
Buy now
Learn more
Intro and Setup
Introduction
Development VM Setup
RTO-Win10.ova
RTO-maldev.zip
RTO-maldev-encrypted.zip
Shellcodes
Portable Executable
PE files - format and structure
PE Bear - looking inside
Generating EXE vs DLL
PE compilation
Droppers
Storing payloads in code section
Data section as a container
Payloads in resource section
Where to store payloads?
Obfuscation and Hiding
Payload encoding
Encrypting payloads - XOR
Encrypting payloads - AES
Antivirus vs call obfuscation
Implementing function call obfuscation
Encoding and Encryption
Backdoors and Trojans
Backdooring PE theory
Making Putty a trojan
Code Injection
Injecting code into remote process
Implementing code injection
Loading DLLs into remote process
DLL generator and injector
What is code injection?
Extras
Making program invisible
Combined Project
Dropper implementation
Bypassing Windows Defender
Assignment
Dropper overview
Summary
Your Feedback
Course closing information
Take everything what you have learned so far, and build a new custom dropper
4 Lessons
Dropper implementation
Bypassing Windows Defender
Assignment
Dropper overview