How Hackers Create Undetectable Malware and Viruses
3.9 (77 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,698 students enrolled
Wishlisted Wishlist

Please confirm that you want to add How Hackers Create Undetectable Malware and Viruses to your Wishlist.

Add to Wishlist

How Hackers Create Undetectable Malware and Viruses

How Hackers are Bypassing the Majority of Antivirus Software and Creating Malware and Viruses that Are Undetectable
3.9 (77 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,698 students enrolled
Created by Nikhil Parekh
Last updated 8/2016
English
English [Auto-generated]
Current price: Free Original price: $195 Discount: 100% off
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand What Undetectable Malware is
  • Learn How to Install Python and Pip
  • Install the Veil Framework
  • Understand the Gnome Desktop
  • Install Wine Mono
  • Learn How to Install Metasploit
  • Test the MSF Console
  • Create an Exploit with Veil
  • Test the Exploit on a Windows 10 Machine
  • How to Encrypt the Payload to Avoid Detection
  • Discover How Hackers Take Control of Webcams, Modify Documents and Much More
View Curriculum
Requirements
  • Open Mind and Willingness to Implement
  • Notebook or Journal to Take Lots of Notes
Description

You are about to learn how hackers create undetectable malware.

Skilled hackers are not using of the shelf products to create malware. They are using sophisticated methods to create malware and viruses that are undetectable my most popular antivirus solutions.

You will learm how to install Python and Pip as well as how to install the Veil Framework.

You will also learn how to install Metasploit and add the final touches to the Veil Framework.

Finally you will be able to create your very own payload with Veil and learn how to encrypt the payload.

You will be shown how the payload can be installed on a Windows 10 machine and how it will evade detection by the latest antivirus software.

See how hackers can potentially steal files, control webcams, grab screenshots, upload files and even modify and manipulate files.

Take this course today. It comes with a 30 day money back guarantee.

Who is the target audience?
  • Anyone wanting to learn about Ethical Hacking and Malware
  • Anyone wanting to Be a Highly Sought After Ethical Hacker by Understanding How Hackers Think
Curriculum For This Course
16 Lectures
01:36:25
+
We Begin Here
2 Lectures 14:07

Introduction to Undetectable Malware
12:04
+
Understanding Malware and Creating the Hacking Environment
4 Lectures 24:46
Installing Python and Pip
05:01


Setting Up The Veil Framework
09:05

+
Veil and Metasploit
7 Lectures 28:23
Wine Mono and Veil-Evasion Installation
02:56


Metasploit Installation Complete
00:35

Testing MSF Console
01:02

Veil Evasion Final Installation
06:44

Adding the Metasploit Folder to Veil Installation
00:40

Introduction to Veil and The Importance in Ethical Hacking
06:48
+
How Hackers Create Undetectable Malware
3 Lectures 29:09
Creating an Exploit
12:24

Testing Exploit on Windows 10 Machine
14:45

Encrypting Payload
02:00
About the Instructor
Nikhil Parekh
4.0 Average rating
3,027 Reviews
120,817 Students
46 Courses
Teaching 120,762 Students in 46 Courses, Celebrity Advisor

Teaching 46 courses with 120,762 students from 186 countries including United States, United Kingdom, Australia, Morocco, Canada, Poland, India, Egypt, Malaysia and Indonesia

I assist many of my clients, ranging from small/medium businesses to INC 500 corporations to multimillion dollar businesses (and even billion dollar businesses), by guiding them to achieve tremendous growth in revenue and profits utilizing my social media user engagement strategies, mobile applications and proprietary tools.

I am also a sought after best selling author and speaker and have been featured on stages all around the world, responsible for teaching thousands of successful entrepreneurs worldwide

Clients refer to me as a profit strategist - I am an expert at helping my clients with referral marketing using my proprietary Fast Referral System.

In addition, I advise a number of high profile celebrities who have been featured on Miss USA, The Apprentice, Miss Universe, BET, WWE, CNN, ESPN, USA Today, Wall Street Journal, NBC, CBS, Fox, ABC, Entrepreneur Magazine and numerous other television shows and radio stations around the world

Specializing in:- Pay Per Click Marketing (including Analytics)- Digital Startups- Social Media Asset Development and Deployment- Social CRM Technology- Strategic Social Media Marketing Campaign Development- Mobile Application Development- Online Reputation Management- Social Community Development, Management and Engagement- Social Brand Management- Social Media Strategy and Planning- Online Community Management and Engagement including in depth social conversation monitoring- Facebook, Twitter and LinkedIn Application Development