Ethical Hacking Foundations: Malware Development in Windows
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3 students enrolled

Ethical Hacking Foundations: Malware Development in Windows

Build your own custom Windows malware from scratch. Become a better ethical hacker, pentester and red teamer!
New
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3 students enrolled
Created by Reenzo Black
Last updated 7/2020
English
English
Current price: $125.99 Original price: $179.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 3 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • What is malware development in Windows
  • What is PE file structure
  • Where to store your payload inside PE
  • How to encode and encrypt payloads
  • How and why obfuscate function calls
  • How to backdoor programs
  • How to inject your code into remote processes
Requirements
  • Understanding of operating system architecture
  • Some experience with Windows OS
  • Basic knowledge about C and Intel assembly
  • Computer with min. 4 GB of RAM + 30 GB of free disk space
  • VirtualBox 6.0+ installed
  • Strong will to learn and having fun
Description

Are you a pen tester having some experience with Metasploit or Empire frameworks? Or maybe you take your first steps as an ethical hacker and you want to know more about how all these offensive tools work? Or you are a blue teamer or threat hunter who needs to better understand the internal workings of malware?

This course will provide you the answers you're looking for. It will teach you how to develop your own custom malware for latest Microsoft Windows 10. And by custom malware we mean building a dropper for any payload you want (Metasploit meterpreter, Empire or Cobalt Strike beacons, etc.), injecting your shellcodes into remote processes, creating trojan horses (backdooring existing software) and bypassing Windows Defender AV.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.

Who this course is for:
  • Ethical Hackers
  • Penetration Testers
  • Blue Teamers
  • Threat Hunters
  • All security engineers/professionals wanting to learn advanced offensive tactics
Course content
Expand all 25 lectures 02:53:13
+ Portable Executable
4 lectures 24:42
PE files - format and structure
03:53
Generating EXE vs DLL
05:02
PE compilation
10:51
+ Droppers
4 lectures 33:32
Where to store payloads?
05:11
Storing payloads in code section
12:39
Payloads in resource section
10:26
+ Obfuscation and Hiding
6 lectures 42:56
Encoding and Encryption
05:06
Payload encoding
09:39
Encrypting payloads - XOR
06:52
Encrypting payloads - AES
06:34
Antivirus vs call obfuscation
03:43
Implementing function call obfuscation
11:02
+ Backdoors and Trojans
2 lectures 25:12
Backdooring PE theory
04:30
Making Putty a trojan
20:42
+ Code Injection
5 lectures 29:56
What is code injection?
04:21
Injecting code into remote process
04:12
Implementing code injection
08:10
Loading DLLs into remote process
05:40
DLL generator and injector
07:33
+ Summary
1 lecture 02:44
Course closing information
02:44