You will learn how to create your custom malware from scratch.
You will learn how to communicate with your Attacker server.
You will learn how to send commands from Attacker to victims.
You will learn how to control multiple computers from one control panel.
You will learn how to enumerate and exfiltrate information from Windows systems.
You will learn how to Download additional files to victims computer.
You will learn how to gain persistence on system.
You will learn how to execute commands via CMD.
You will learn how computer viruses work.
Basic TCP/IP knowledge.
Basic programming knowledge.
Basic GNU/Linux knowledge.
Basic object orianted programming language knowledge will be a plus.
Are you interested in cybersecurity and/or developing your offensive tools in ethical hacking purposes ?
In this course, we will dive deep into the malwares and control panels by creating an actual one. You will learn how to develop your own custom malware from scratch with step-by-step detailed instructions for beginners. You will also learn how to enhance your malware's capabilities by developing special methods such as gathering host information, gaining persistance, uploading files to victim computer and executing commands via Command Line. After developing your own malware, you will then develop a custom attacker server software to control multiple victims at the same time from a web panel like professional C2 servers using PHP and MySQL.
This course will provide you with everything you need to know in terms of malware and command-control server in beginner level. After this course you will feel more confident in your skills as a penetration tester, ethical hacker and red teamer. You will also have a fundamental understanding of offensive tools. If you are a blue teamer, threat hunter or incident responder, you can also benefit from this course by knowing how threat actors and APT's develope their malwares and command control structures.
All of the captions are reviewed so feel free to use it for better learning experience.
Who this course is for:
Anyone interested in developing custom malwares.
System / Network Admins
Blue Teams / Threat Hunters
Cyber security enthusiasts
6 sections • 26 lectures • 3h 13m total length
Installing Guest Additions
Creating First Windows Application
Installing Apache, PHP, MySQL and ATOM on Ubuntu
Gathering Information About The Victim Computer
Gaining Persistence on System
Downloading Files in Victim System
Creating Necessary Functions for Returning Information
Executing Commands via CMD
Dealing with Exceptions and Fixing a minor Bug
Connecting to the Attacker Server
Creating a Database For Control Panel
Creating Login Page
Creating Username and Password for Control Panel
Creating a Session Control Mechanism
Creating the Main Page of Control Panel
Creating the Registration Page for Victims
Creating the Command Sender Page
Creating the Result Reciever Page
Creating the Victim Management Pages
Putting All Together (Last Touches In Client Software)
Hi i am ethical hacker / red teamer since 2015. I perform network, web penetration tests and source code analysis operations. I am the author of a few zeroday exploits and a few offensive-security tools.
Currently i am OSCP, OSWP and CEH | Practical holder.
Hopefully my courses will enchance your skills in ethical hacking and red teaming.