Descriptions
Malware Development and Reverse Engineering 1: The Basics, Just the How To fill this knowledge gap, I created this course. You will learn first-hand from a malware developer’s perspective what Windows API functions are commonly used in malware and finally understand why you need to trace them when reverse engineering malware. In this course, we will use free tools including Oracle Virtual Box and Flare-VM, as well as Microsoft Visual Studio 2019 C++ Community Edition. We will also install Kali Linux in Virtual Box to learn how to use Metasploit to generate Windows shellcode. Everything is very hands-on. No boring theory or lectures. More like walkthroughs that you can follow along with. By the end of this course, you will have the basic knowledge to better understand how malware works from the programmer’s perspective. This knowledge and skills will be suitable for those who want to become a Red Teamer.
What you will learn
- Basic programming for malware analysis
- Basic programming skills for reverse engineering
- Creating and compiling EXE and DLLs
- Creating Windows Shellcode with Metasploit on Kali Linux
- Analyzing the memory of a running malware
- Insert shellcode into running processes
- Create remote thread
- Encryption of payloads and function call string parameters
- Hiding shellcode payloads in executable files
- Obfuscate function calls
- Malware stealth strategies
- Payload encoding
- Trojan Development Life Cycle
Who is this course suitable for?
- Students of reverse engineering and malware analysis
- Programmers who want to know how malware is created
- Students planning a career in malware analysis and reverse engineering or penetration testing
- Penetration testers and ethical hackers
Specifying Malware Development and Reverse Engineering 1: The Basics
- Editor: Udemy
- Teacher: Paul Chin
- Language: English
- Level: All levels
- Number of courses: 56
- Duration: 7 hours and 49 minutes
Contents of Malware Development and Reverse Engineering 1: The Basics
1. How to set up a malware development lab
2. PE header export directory structure
3. PE header import directory and IAT structure
4. Advanced function obfuscation
5. Thread context injection
6. Code injection in the map view
7. APC injection (Asynchronous Procedure Call).
8. Early Bird APC Injection
9. Reflective loading trojans
10. Heaven’s Gate Cross Injections
11. API Hooking Using the Detours Library
12. Integrating the IAT (Import Address Table)
13. API Hooking with Inline Patch Hooking
14. Controlling multiple processes
15. Lab Project Password Sniffer Trojan
16. Bonus lecture
Requirements
- Windows PC
- Basic C language
- Basic Linux commands
Sample clip
installation Guide
Extract the files and watch them with your favorite player
Subtitles: English
Quality: 720p
Download links
Password file(s): free download software
File size
4.32GB