The Basics 2021-10 – Download

Descriptions

Malware Development and Reverse Engineering 1: The Basics, Just the How To fill this knowledge gap, I created this course. You will learn first-hand from a malware developer’s perspective what Windows API functions are commonly used in malware and finally understand why you need to trace them when reverse engineering malware. In this course, we will use free tools including Oracle Virtual Box and Flare-VM, as well as Microsoft Visual Studio 2019 C++ Community Edition. We will also install Kali Linux in Virtual Box to learn how to use Metasploit to generate Windows shellcode. Everything is very hands-on. No boring theory or lectures. More like walkthroughs that you can follow along with. By the end of this course, you will have the basic knowledge to better understand how malware works from the programmer’s perspective. This knowledge and skills will be suitable for those who want to become a Red Teamer.

What you will learn

  • Basic programming for malware analysis
  • Basic programming skills for reverse engineering
  • Creating and compiling EXE and DLLs
  • Creating Windows Shellcode with Metasploit on Kali Linux
  • Analyzing the memory of a running malware
  • Insert shellcode into running processes
  • Create remote thread
  • Encryption of payloads and function call string parameters
  • Hiding shellcode payloads in executable files
  • Obfuscate function calls
  • Malware stealth strategies
  • Payload encoding
  • Trojan Development Life Cycle

Who is this course suitable for?

  • Students of reverse engineering and malware analysis
  • Programmers who want to know how malware is created
  • Students planning a career in malware analysis and reverse engineering or penetration testing
  • Penetration testers and ethical hackers

Specifying Malware Development and Reverse Engineering 1: The Basics

  • Editor: Udemy
  • Teacher: Paul Chin
  • Language: English
  • Level: All levels
  • Number of courses: 56
  • Duration: 7 hours and 49 minutes

Contents of Malware Development and Reverse Engineering 1: The Basics

1. How to set up a malware development lab
2. PE header export directory structure
3. PE header import directory and IAT structure
4. Advanced function obfuscation
5. Thread context injection
6. Code injection in the map view
7. APC injection (Asynchronous Procedure Call).
8. Early Bird APC Injection
9. Reflective loading trojans
10. Heaven’s Gate Cross Injections
11. API Hooking Using the Detours Library
12. Integrating the IAT (Import Address Table)
13. API Hooking with Inline Patch Hooking
14. Controlling multiple processes
15. Lab Project Password Sniffer Trojan
16. Bonus lecture

Requirements

  • Windows PC
  • Basic C language
  • Basic Linux commands

Sample clip

installation Guide

Extract the files and watch them with your favorite player

Subtitles: English

Quality: 720p

Download links

Download Part 1 – 1 GB

Download Part 2 – 1 GB

Download Part 3 – 1 GB

Download Part 4 – 1 GB

Download Part 5 – 328 MB

Password file(s): free download software

File size

4.32GB

free download software latest version