Description
Malware Development 2: Advanced Injection and API Hooking, Malware Development 2: Advanced Injection and API Hooking course is published by Udemy Academy. This course is about more advanced techniques in malware development. This course builds on what you learned in Malware Development and Reverse Engineering 1: Fundamentals to expand your development skills. You’ll learn first-hand from a malware developer’s perspective what Windows API functions are commonly used in malware, and you’ll end up with a deeper understanding of malware so you’ll have more skills later when performing malware analysis. Create programs that simulate Windows Trojans and reverse engineer them. This will make you a better reverse engineer and malware analyst as well as penetration tester. The best way to understand malware is to be a malware developer.
Some topics include two parts: programming and inversion. In the programming sections, we write programs that simulate Trojan behavior using API functions commonly found in malware. In the final section, there will be a lab project where you combine all the knowledge you’ve learned to build a Trojan that can survive reboots and find the disk encryption password and save it to a recording file. slow Everything is very practical. No theory or boring lectures. More like solutions that you can iterate and follow.
What you will learn
- How the address function works
- Advanced code injection techniques
- Build a custom reflective binary
- Hook APIs in memory
- Switch between 32-bit and 64-bit processes
- Use IPC to control multiple processing loads
- Advanced DLL injection techniques
- Heaven’s Gate injection
- Advanced function obfuscation
- Injection in Thread Context
- Asynchronous procedure call injection
- Early Bird APC Injection
- Loading Reflective Trojans
- API Hooking using Detours Library
- Entering Address Table (IAT) Hooking
Who is this course suitable for?
- Students of reverse engineering and malware analysis
- Programmers who want to know how malware is created
- Students who intend to enter the careers of malware analysis and reverse engineering or penetration testers
- Penetration testers and ethical hackers
Course specifications Malware Development 2: Advanced Injection and API Hooking
- Publisher: Udemy
- teacher : Paul Chin
- English language
- Education level: all levels
- Number of courses: 53
- Training duration: 6 hours and 38 minutes
Chapters of the course Malware Development 2: Advanced Injection and API Hooking
01 Introduction
02 Installing The Tools
03 Building EXE and DLL and Examining PE Structure
04 Embedding Shellcode Payloads in EXE files
05 Generating Shellcodes Using Metasploit in Kali Linux
06 Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg
07 Testing Unpacked Dumped Shellcode Payload Using Hexeditor and a C Program
08 Base64 Encoding of Shellcode Payload
09 Reverse Engineering Base64 Encoded Payloads
10 XOR Encryption of Payload
11 Reverse Engineering XOR Encryption
12 AES Encryption of Payload
13 Reverse Engineering AES Encryption Using CryptDecrypt
14 Testing Shellcode Using Shellcode Runner
15 Obfuscating Functions Using GetProcAddress and XOR Encryption
16 Reverse Engineering Function Obfuscation
17 Trojan Engineering Using Code Caves
18 Reverse Engineering Code Cave Trojans
19 Process Injection
20 Detecting Process Injection and Reverse Engineering it
21 Testing Process Injection Shellcode with ShellcodeRunnerInjected
22 DLL Injection
23 Detecting and Reverse Engineering DLL Injection
24 Creating a Stealth Trojan
25 Lab Project _ Creating a Trojan with Encrypted Payload and Injection Capability
26 Reverse Engineering the Lab Project Trojan
27 Anti Virus Evasion
28 Bonus Lecture
Course prerequisites
- Windows PC
- Basic C Language
- Preferably already completed Malware Development and Reverse Engineering 1: The Basics
Sample video
Installation guide
After Extract, view with your favorite Player.
English subtitle
Quality: 720p
download link
File(s) password: www.downloadly.ir
Size
3.61 GB
Be the first to comment