English | Size: 4.32 GB
Genre: eLearning
Description
Many malware analysts perform reverse engineering on malware without knowing the why’s. They only know the how’s. To fill that knowledge gap, I have created this course.
You will learn first-hand from a Malware Developers’ perspective what windows API functions are commonly used in malware and finally understand why you need to trace them when reversing malware.
Learning Methodology:Build programs that simulate Windows Trojans and Reverse Engineer them.
This will make you a better Reverse Engineer and Malware Analyst and also Penetration Tester.
The best way to understand malware is to be a Malware Developer.
How to compile and build executables and dynamic link libraries (DLL)
Windows API used in Malware
Creating shellcode using Metasploit on Kali Linux
Hiding shellcode payload in executable files
How to analyze and inspect memory of a running malware
Injecting Shellcode into running processes
Creating Remote Threads
Encryption of Payloads and Function Call String Parameters
Obfuscation of Function Calls
Malware Stealth Strategies
Encoding of Payloads
Trojan Development Life Cycle
How Anti Virus works under the hood
Using Yara to study malware signatures
Anti Virus Evasion Techniques
Dynamic Runtime API Loading
and more
We will be using free tools in this course, including Oracle Virtual Box and Flare-VM and the Community Edition of Microsoft Visual Studio 2019 C++. We will also install Kali Linux in the Virtual Box for learning how to use Metasploit to generate windows shellcode. Everything is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along.
By the end of this course, you will have the basic skills to better understand how Malware works from the programmers’ point of view. This knowledge and skills are suitable for those aspiring to be Red Teamers.
Also, having practical knowledge of malware development will give you a better understanding of how to reverse engineer malware. For example, when reversing and analyzing a trojan, we usually put breakpoints of dangerous API functions calls – but don’t know why we do it. Now, in this course, I will show you the reasons for it. By the end of this course, you would have gained a solid foundation for understanding why and how malware reverse engineering works.
Who this course is for:Reverse Engineering and Malware Analysis Students
Programmers who want to know how Malware is created
Students planning on entering Malware Analysis and Reverse Engineering or Penetration Testers as a Career Path
Penetration Testers and Ethical Hackers
rapidgator.net/file/0346f23605a04bdbeccf892ea85d0db6/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part1.rar.html
rapidgator.net/file/836ab3ec63b4b56182bf4d07d2e5aa7b/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part2.rar.html
rapidgator.net/file/40404b6d8e9c530c8ace622376bdc0ab/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part3.rar.html
rapidgator.net/file/47c73bbd8e1c6a869e8ccac27d2254ab/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part4.rar.html
rapidgator.net/file/96d6d8f579c63b50b6d516964b5630d0/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part5.rar.html
tbit.to/21u9nkrwbumn/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part1.rar.html
tbit.to/0aypua49mcih/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part2.rar.html
tbit.to/9a57jxd130z0/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part3.rar.html
tbit.to/z9xvbyj5rihw/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part4.rar.html
tbit.to/k2n7yfm4evz0/UD-MalwareDevelopmentandReverseEngineering1TheBasics2021-10.part5.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9