How Hackers Create Undetectable Malware and Viruses
3.9 (233 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
25,059 students enrolled

How Hackers Create Undetectable Malware and Viruses

How Hackers are Bypassing the Majority of Antivirus Software and Creating Malware and Viruses that Are Undetectable
3.9 (233 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
25,059 students enrolled
Created by Nikhil Parekh
Last updated 2/2018
English
English [Auto-generated]
Current price: Free Original price: $194.99 Discount: 100% off
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to Udemy's top 3,000+ courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Understand What Undetectable Malware is
  • Learn How to Install Python and Pip

  • Install the Veil Framework

  • Understand the Gnome Desktop
  • Install Wine Mono
  • Learn How to Install Metasploit
  • Test the MSF Console
  • Create an Exploit with Veil
  • Test the Exploit on a Windows 10 Machine
  • How to Encrypt the Payload to Avoid Detection
  • Discover How Hackers Take Control of Webcams, Modify Documents and Much More
Requirements
  • Open Mind and Willingness to Implement
  • Notebook or Journal to Take Lots of Notes
Description

You are about to learn how hackers create undetectable malware.

Skilled hackers are not using of the shelf products to create malware. They are using sophisticated methods to create malware and viruses that are undetectable my most popular antivirus solutions.

You will learm how to install Python and Pip as well as how to install the Veil Framework.

You will also learn how to install Metasploit and add the final touches to the Veil Framework.

Finally you will be able to create your very own payload with Veil and learn how to encrypt the payload.

You will be shown how the payload can be installed on a Windows 10 machine and how it will evade detection by the latest antivirus software.

See how hackers can potentially steal files, control webcams, grab screenshots, upload files and even modify and manipulate files.

Take this course today. It comes with a 30 day money back guarantee.

Who this course is for:
  • Anyone wanting to learn about Ethical Hacking and Malware
  • Anyone wanting to Be a Highly Sought After Ethical Hacker by Understanding How Hackers Think
Course content
Expand all 16 lectures 01:36:25
+ Veil and Metasploit
7 lectures 28:23
Wine Mono and Veil-Evasion Installation
02:56
Metasploit Installation Complete
00:35
Testing MSF Console
01:02
Veil Evasion Final Installation
06:44
Adding the Metasploit Folder to Veil Installation
00:40
Introduction to Veil and The Importance in Ethical Hacking
06:48
+ How Hackers Create Undetectable Malware
3 lectures 29:09
Creating an Exploit
12:24
Testing Exploit on Windows 10 Machine
14:45
Encrypting Payload
02:00