• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

RTO - Malware Development Advanced Vol. 1

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,618
Solutions
2
Reputation
32
Reaction score
100,455
Points
2,313
Credits
32,700
‎6 Years of Service‎
 
76%
photo-2022-10-31-09-21-12.jpg


RED TEAM Operator: Malware Development Advanced - Vol.1

Advanced malware development topics for Windows user land only, including: hidden data storage, rootkit techniques, finding privileged objects in system memory, detecting new process creation, generating and handling exceptions, building COFFs and custom RPC-like instrumentation, and more.

Welcome to Malware Development Advanced (Vol.1) course!

In the previous Intermediate course we covered some of the more advanced malware development topics.

This time we will be focusing on extending your payload with additional userland techniques to bury it in the depths of the system. That includes:

    ways to hide your payload inside NTFS and registry hive
    learning object enumeration alternatives in the system memory
    manipulating Process Environment Blocks to hide your module and confuse the potential defender
    finding .NET process with RWX memory ready to abuse
    detecting new process creation (from userland)
    setting up global hooks
    learning few userland rootkit techniques to hide your files, registry keys and processes
    abusing memory and hardware breakpoints for hooking
    hiding payload with Gargoyle and similar techniques
    creating custom "RPC" allowing to call any API function with any number of parameters in a remote process
    learning COFF objects, how to build, parse, load and execute them in the memory

The course ends with a custom project, employing some of the discussed techniques.

You will receive a virtual machine with complete environment for developing and testing your software, and a set of source code templates which will allow you to focus on understanding the essential mechanisms instead of less important technical aspects of implementation.

Code:
https://institute.sektor7.net/rto-maldev-adv1
To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top