Descriptions
Malware Development 2: Advanced Injection and API Hooking. This course is about more advanced techniques in malware development. This course builds on what you learned in Malware Development and Reverse Engineering 1: The Basics. You will learn firsthand from a malware developer’s perspective which Windows API functions are commonly used in malware and ultimately have a deeper understanding of malware so that you have more advanced skills in malware analysis later on. Learning Methodology: Create programs that simulate Windows Trojans and reverse engineer them. This will make you a better reverse engineer and malware analyst as well as penetration tester. The best way to understand malware is to be a malware developer. Features: Some topics have two parts: programming and reversing.
In the programming parts, we will write programs that simulate Trojan behavior using API functions typically found in malware. In the final section, there will be a lab project where you will combine all the knowledge you have learned to create a Trojan that survives a reboot, sniffs for a disk encryption password, and saves it to a file. Everything is very hands-on. No boring theory or lectures. More like walkthroughs that you can follow along with and follow along with. By the end of this course, you will have the basic knowledge to better understand how malware works from a programmer’s perspective. This knowledge and skills are suitable for those who want to become red teamers. Even if you have no intention of creating malware, the insider knowledge and skills you will gain in this course will make you a better security professional.
What you will learn
- How function address resolution works
- Advanced code injection techniques
- Create a custom reflective binary
- Integrating APIs into storage
- Switch between 32-bit and 64-bit processes
- Using IPC to control multiple process payloads
- Advanced DLL injection techniques
- Heaven’s Gate Cross Injections
- Advanced function obfuscation
- Thread context injection
- Code injection in the map view
- Asynchronous procedure call injection
- Early bird APC injection
- Reflective loading trojans
- API hooking using the Detours library
- Integrating the import address table (IAT).
Who is this course suitable for?
- Students of reverse engineering and malware analysis
- Programmers who want to know how malware is created
- Students planning a career in malware analysis and reverse engineering or penetration testing
- Penetration testers and ethical hackers
Malware Development Specifics 2: Advanced Injection and API Hooking
- Editor: Udemy
- Teacher: Paul Chin
- Language: English
- Level: All levels
- Number of courses: 53
- Duration: 6 hours and 38 minutes
Contents of Malware Development 2: Advanced Injection and API Hooking
01 Introduction
02 Installing the tools
03 Creating EXE and DLL and examining the PE structure
04 Embedding shellcode payloads in EXE files
05 Generating Shellcodes with Metasploit in Kali Linux
06 Embedding the shellcode payload in the .RSRC section and analyzing it with xdbg
07 Testing the unpacked shellcode payload with hex editor and a C program
08 Base64 encoding of the shellcode payload
09 Reverse engineering Base64-encoded payloads
10 XOR encryption of the payload
11 Reverse engineering XOR encryption
12 AES encryption of the payload
13 Reverse engineering of AES encryption with CryptDecrypt
14 Testing Shellcode with Shellcode Runner
15 Obfuscating functions with GetProcAddress and XOR encryption
16 Concealment of reverse engineering functions
17 Trojan Engineering Using Code Caves
18 Reverse Engineering Code Cave Trojan
19 Process injection
20 Process injection detection and reverse engineering
21 Testing Process Injection Shellcode with ShellcodeRunnerInjected
22 DLL injection
23 Detection and reverse engineering of DLL injection
24 Creating a Stealth Trojan
25 Lab Project _ Creating a Trojan with encrypted payload and injection function
26 Reverse engineering of the lab project Trojan
27 Anti-Virus Bypass
28 Bonus lecture
Requirements
- Windows PC
- Basic C language
- Preferably already completed Malware development and reverse engineering 1: The basics
Sample clip
installation Guide
Extract the files and watch them with your favorite player
Subtitles: English
Quality: 720p
Download links
Password file(s): free download software
File size
3.61GB