LAST UPDATED: JUNE 2017
Welcome to Hacking School!
Rootkits and Stealth Software: Creating and Revealing Course v2.0
Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.
A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. - definition by Wikipedia
But it does not make the problem disappear.
Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.
This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.
What you can expect from this course:
We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.
Good luck and see you on the other side,
Andrew Harper || Hacking School Team
Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits, What you need to know to start, Compatibility and current code version, Further reading
Theory: Assembly language crash course, Register types, Instruction syntax, Writing shellcode, Shellcode writing: the essentials, Glossary, Code injection, Notes about the 64-bit architecture
Theory: Intro, Writing rootkit code, Hiding processes, Hiding files and registry entries, Notes on 64-bit architecture
Theory: Hiding files
Theory: Intro, Notes about the 64-bit mode, Hiding registry entries
Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun
Theory: Remote console
Theory: What defense mechanisms are included in Windows?
Theory: Understanding how antiviruses detect threats, Signatures
Theory: Heuristics, Deceiving a heuristic scanner
Theory: Emulation, RC4 overview, System calls and 64-bit architecture
Theory: Bypassing a firewall, Modifying the remote console
Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing
Theory: Rootkit detectors
The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.
We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.
IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.