Rootkits and Stealth Software: Creating and Revealing 2.0
4.2 (70 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,044 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Rootkits and Stealth Software: Creating and Revealing 2.0 to your Wishlist.

Add to Wishlist

Rootkits and Stealth Software: Creating and Revealing 2.0

Complete guide to rootkit and stealth software development
4.2 (70 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
3,044 students enrolled
Last updated 8/2016
English
Price: $100
30-Day Money-Back Guarantee
Includes:
  • 5.5 hours on-demand video
  • 16 Articles
  • 19 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Over 30 lectures and 10 hours of content!
  • Lectures in PDF + Live Video Training
  • Free source code package to download
  • How to create shellcode
  • How to inject code
  • How to hide processes, files, directories and registry entries
  • How to keep a rootkit in a system
  • How to create a backdoor
  • How to create an invisible keylogger and remote console
  • How to make a screenshot
  • Creating undetectable applications
  • How to deceive Anti-Virus applications
  • How to use anti-emulation techniques
  • How to bypass a firewall
  • How to create a rootkit detector
  • How to protect against rootkits
View Curriculum
Requirements
  • interest in ITsec and ethical hacking
  • some IT and programming basics (C/C++)
Description

LAST UPDATED: JUNE 2017

Welcome to Hacking School!

Rootkits and Stealth Software: Creating and Revealing Course v2.0

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. - definition by Wikipedia

  • You can ignore the fact that rootkits really exist,
  • You can pretend that goverment agencies don't use rootkits,
  • You can even believe that big companies don't spend huge amount of money for developing malicious software that can spy on you and your family,
  • You can just turn a blind eye on it and ignore these fact.

But it does not make the problem disappear.

Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.

This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

What you can expect from this course:

  • You'll learn how to create shellcode
  • You'll learn how to inject code into processes
  • You'll learn how to hide processes, files, directories and registry entries
  • You'll learn how to keep a rootkit in a system
  • You'll learn how to create a backdoor
  • You'll learn how to create an invisible keylogger and remote console
  • You'll learn how to make a screenshot
  • You'll learn how to create undetectable applications
  • You'll learn how to deceive Anti-Virus applications
  • You'll learn how to use anti-emulation techniques
  • You'll learn how to bypass a firewall
  • You'll learn how to create a rootkit detector
  • You'll learn how to protect against rootkits
  • And many other interesting topics


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

Who is the target audience?
  • students interested in rootkit development
  • ethical hackers
  • system and network administrators
  • everyone interested in ethical hacking in general
  • ISA CISS, CEH, CISSP, MCSE, CCNA
Compare to Other Network Security Courses
Curriculum For This Course
37 Lectures
05:42:53
+
Introduction
2 Lectures 26:19

Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits, What you need to know to start, Compatibility and current code version, Further reading

Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits, W
00:07

+
Download your training source code and examples
1 Lecture 00:05
Your ZIP package with the source code and examples
00:05
+
Basics of shellcode
2 Lectures 17:42

Theory: Assembly language crash course, Register types, Instruction syntax, Writing shellcode, Shellcode writing: the essentials, Glossary, Code injection, Notes about the 64-bit architecture

Theory: Assembly language crash course, Register types, Instruction syntax, Writ
00:07

Basics of shellcode development - VIDEO TRAINING
17:35
+
Hiding processes, files and registry entries
6 Lectures 48:53

Theory: Intro, Writing rootkit code, Hiding processes, Hiding files and registry entries, Notes on 64-bit architecture

Theory: Intro, Writing rootkit code, Hiding processes
00:03

Hiding processes - VIDEO TRAINING
17:46

Theory: Hiding files

Theory: Hiding files
00:01

Hiding files and directories - VIDEO TRAINING
19:07

Theory: Intro, Notes about the 64-bit mode, Hiding registry entries

Theory: Intro, Notes about the 64-bit mode, Hiding registry entries
00:03

Hiding registry entries - VIDEO TRAINING
11:52
+
Creating a backdoor and a keylogger
4 Lectures 36:22

Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun

Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending
00:04

Creating a keylogger - VIDEO TRAINING
23:50

Theory: Remote console

Theory: Remote console
00:01

Creating a remote console - VIDEO TRAINING
12:26
+
Windows security features
2 Lectures 10:35

Theory: What defense mechanisms are included in Windows?

Theory: What defense mechanisms are included in Windows?
00:03

Windows security features - VIDEO TRAINING
10:32
+
Creating undetectable applications
6 Lectures 31:08

Theory: Understanding how antiviruses detect threats, Signatures

Theory: Understanding how antiviruses detect threats, Signatures
00:02

Creating undetectable applications - VIDEO TRAINING
12:50

Theory: Heuristics, Deceiving a heuristic scanner

Theory: Heuristics, Deceiving a heuristic scanner
00:02

Deceiving a heuristic scanner - VIDEO TRAINING
08:00

Theory: Emulation, RC4 overview, System calls and 64-bit architecture

Theory: Emulation, RC4 overview, System calls and 64-bit architecture
00:03

Anti-emulation techniques - VIDEO TRAINING
10:10
+
Bypassing the firewall
2 Lectures 14:12

Theory: Bypassing a firewall, Modifying the remote console

Theory: Bypassing a firewall, Modifying the remote console
00:03

Bypassing the firewall - VIDEO TRAINING
14:09
+
Keeping a rootkit in a system
2 Lectures 17:38

Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing

Theory: Areas for hiding programs, Running a program as a system service, Dll sp
00:04

Keeping a rootkit in a system - VIDEO TRAINING
17:34
+
Defense and rootkit detectors
2 Lectures 19:05

Theory: Rootkit detectors

Theory: Rootkit detectors
00:01

Defense and rootkit detectors - VIDEO TRAINING
19:04
2 More Sections
About the Instructor
Hacking School
4.0 Average rating
2,135 Reviews
70,870 Students
13 Courses
IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

IT Security Academy
4.0 Average rating
2,519 Reviews
78,192 Students
25 Courses
IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.