• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Courses Advanced Ransomware Development Course

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,608
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,600
‎6 Years of Service‎
 
76%
screenshot-1298.png


Advanced Ransomware Development.

What you'll learn

The student will have the knowledge to develop advanced malware
The complete course has 14 theoretical and practical modules, starting with the introduction to Ransomware through to the complete development of the malware.
The course teaches theoretically and practically the development and operation of a Ransowmare
With the knowledge from this course, a student will have knowledge about how the most famous software currently available works.

Course content
10 sections • 55 lectures • 11h 9m total length


Requirements

You don't need knowledge, just a desire to learn.

Description

1. PRESENTATION

Here we will begin to teach the history of Ransomware, how it

emerged, first reports, groups, victims and much more.

2. Golang Logic

Finishing the theoretical knowledge, we move on to practice, we

start by learning the basics of the Golang language, variables,

functions, modules, channel, etc

3. File Manipulation

Now that we know the basics of Golang, let's dive in and learn

about file manipulation, reading, writing, listing, permissions, etc.

Since this is a Ransomware course, it's important to know about

files, don't you agree?

4. Hash

Here we will learn a little about Hash, md5, base64, sha256

among others.

5. Advanced encryption

In this module, we will start to make the content more difficult, the

student will learn in depth the basic and advanced knowledge

about symmetric and asymmetric cryptography, many used in

famous Ransomware, AES, RSA, CHACHA20.

6. Sandbox

Let's learn a little about sandbox environments for evasion

processes, creating several functions that we can detect if our

malware is running in test environments.

7. Running processes

In real ransomware, there is a list of running processes, this step

is important, the objective is to know which processes we must kill

for the malware to run.

8. Infosystem

In this module, we will talk about collecting information from our

“Targets”, hostname, username, addresses, permission, OS.9. About Logs

In this module, we will learn about logs stored on our targets and

how we can “eliminate” them, an important process in the attack

to erase traces.

10. README

Here we will learn how to create our famous warning banner, the

one that all ransomware has: “All your files have been encrypted,

do not attempt to recover them………”

Who this course is for:

Malware Developers, Red Team, Pentesters, Reverse Engineers.

https://www.udemy.com/course/course-malware-development

To see this hidden content, you must like this content.
 
Back
Top