17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Malware Development 2 Advanced Injection And API Hooking
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
This course is about more advanced techniques in Malware Development. This course builds on what you have learned in Malware Development and Reverse Engineering 1: The Basics, by extending your development skills with:
advanced function obfuscation by implementing customized API calls
more advanced code injection techniques
advanced DLL injection techniques
understanding how reflective binaries work and building custom reflective DLLs
hijacking and camouflaging trojan shellcodes inside legitimate running processes
memory hooking to subvert the normal flow of a running process
exploiting the vulnerability in 32- and 64-bit process migrations
hooking the Import AddressTables (IAT) to replace it with your own functions
using inter process communication to control execution of multiple trojan processes
hooking API calls and replacing them with your own customized function
implementing DLL injection and API hooking to sniff and capture disk encryption passwords
advanced AV evasion and obfuscation techniques
and more…
You will learn first-hand from a Malware Developers’ perspective what windows API functions are commonly used in malware and finally have a deeper understanding of malware so that you will have enhanced skills when doing malware analysis later.
Learning Methodology:
Build programs that simulate Windows Trojans and Reverse Engineer them.
This will make you a better Reverse Engineer and Malware Analyst and also Penetration Tester.
The best way to understand malware is to be a Malware Developer.
Features:
Some topics will contain two parts: programming and reversing.
In the programming parts we will be writing programs that simulate trojan behavior by using API functions typically found in malware.
In the final section, there will be a Lab Project, where you will combine all the knowledge you learn to create a trojan that can survive a reboot and sniff for a disk encryption password and capture it to a file.
Everything is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along.
By the end of this course, you will have the basic skills to better understand how Malware works from the programmers’ point of view. This knowledge and skills are suitable for those aspiring to be Red Teamers. Even if you have no intention of creating malware, the insider knowledge and skills you gain from this course will make you a better security professional.
Also, having practical knowledge of malware development will give you a better understanding of how to reverse engineer malware. By the end of this course, you would have gained a solid foundation for understanding how hackers can exploit windows API to inject malicious code into other processes.
Suitable for:
Reverse Engineering and Malware Analysis Students
Programmers who want to know how Malware is created
Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path
Penetration Testers and Ethical Hackers
Prerequisite:
Windows PC Basic C Language Preferably already Completed Malware Development and Reverse Engineering 1: The Basics
Who this course is for:
Reverse Engineering and Malware Analysis Students Programmers who want to know how Malware is created Students planning on entering Malware Analysis and Reverse Engineering or Penetration Testers as a Career Path Penetration Testers and Ethical Hackers
Last Updated 10/2021
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
35 B
.pad/1
71 B
.pad/2
13 B
.pad/3
45 B
.pad/4
107 B
.pad/5
86 B
.pad/6
140 B
.pad/7
122 B
.pad/8
133 B
.pad/9
36 B
TutsNode.com.txt
63 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/1. How to setup a malware development lab/1. How to setup a malware development lab.srt
1.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/1. How to setup a malware development lab/1.1 playlist on how to setup a malware dev lab.txt
142 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/1. Introduction to 32-bit and 64-bit Cross Injections.srt
5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/1.1 32-bit to 64-bit cross injections.pdf
689.5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/1.2 32-bit to 64-bit cross injections.pptx
45.9 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/1.3 notes on 32bit to 64bit cross injections.txt
1.1 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/2. Practical Walkthrough on Classic Cross Injections.mp4
171.8 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/2. Practical Walkthrough on Classic Cross Injections.srt
16.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/2.1 10-cross-injection-v1-original.zip
10.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/2.2 11-cross-injection-v2-encrypted.zip
10.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/3. Practical Walkthrough on Heaven's Gate Injection.mp4
133 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/3. Practical Walkthrough on Heaven's Gate Injection.srt
11.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/4. Encrypting Heaven's Gate.mp4
131.8 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/10. Heaven's Gate Cross Injections/4. Encrypting Heaven's Gate.srt
9.8 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/1. Intro to API Hooking Using the Detours Library.srt
6.2 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/1.2 api hooking using detours.pptx
85.9 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/1.3 detours article- by hunt and brubacher.pdf
97.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/1.4 notes on api hooking using detours.txt
351 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/2. An Explanation of the APIs used in the Detours Technique.srt
10.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/3. Practical Walkthrough on Using the Detours Library.srt
9.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/11. API Hooking Using the Detours Library/4. Reverse Engineering Detours.srt
4.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/12. Hooking the IAT (Import Address Table)/1.2 hooking the iat.pptx
35.5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/12. Hooking the IAT (Import Address Table)/2. Explanation of the IAT Hooking Code.srt
7.9 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/13. API Hooking using Inline Patch Hooking/1.2 inline patch hooking.pptx
31.5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/13. API Hooking using Inline Patch Hooking/2. Explanation of Code for Patch Hooking.srt
10.5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/13. API Hooking using Inline Patch Hooking/4. Reverse Engineering Patch Hooking.mp4
130.1 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/13. API Hooking using Inline Patch Hooking/4. Reverse Engineering Patch Hooking.srt
11.1 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/14. Multiple Processes Control/1.2 multiple process control.pptx
39 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/14. Multiple Processes Control/2. Explanation of API used for locking processes.srt
9.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/14. Multiple Processes Control/3. Practical Walkthrough on multiple processes control.srt
8.1 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/1.2 lab project - password sniffer.pptx
39.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/2. Installing VeraCrypt.srt
9.8 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/3. Using API Monitor to hunt for the password function.srt
10 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/4. Explanation of the source code for the Trojan and password-sniffer DLL.mp4
189.2 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/4. Explanation of the source code for the Trojan and password-sniffer DLL.srt
22.1 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/4.1 16-labproject-passwordsniffer.zip
729.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/5. Building the Password Sniffer DLL.srt
6.9 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/6. Building the DLL Injector Trojan.mp4
116.8 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/6. Building the DLL Injector Trojan.srt
11.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/7. Making the Trojan stealthy.srt
5.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/15. Lab Project Password Sniffer Trojan/7.1 winmain-signature.txt
218 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/2. PE Header Export Directory Structure/1. Introduction to the PE Header's Export Directory Structure.srt
9.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/2. PE Header Export Directory Structure/2. Practical Walkthrough on PE Header Export Directory Structure.mp4
164.2 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/2. PE Header Export Directory Structure/2. Practical Walkthrough on PE Header Export Directory Structure.srt
14.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/1. Introduction to PE Header Import Directory and IAT Structure.srt
8.5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/1.1 PE Header IAT Directory Structure.pdf
796.1 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/2. Practical on PE Header Import Directory Structure and IAT.mp4
176.4 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/2. Practical on PE Header Import Directory Structure and IAT.srt
12.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/3. PE Header Import Directory and IAT Structure/2.1 02-calc iat.zip
156.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/1. Introduction to Advanced Function Obfuscation.mp4
135.9 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/1. Introduction to Advanced Function Obfuscation.srt
20.8 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/1.2 obfuscating functions notes.txt
809 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/2. Practical Walkthrough on Advanced Function Obfuscation.srt
8.8 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/4. Advanced Function Obfuscation/2.1 03-advanced_function_obfuscation.zip
9.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/5. Thread Context Injection/1. Introduction to Thread Context Injection.srt
4.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/5. Thread Context Injection/2. Explanation of APIs used in Thread Context Injection.srt
13.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/5. Thread Context Injection/2.1 04-thread_context_injection.zip
68.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/5. Thread Context Injection/2.2 Notes on Thread Context Injection.txt
2.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/1. Introduction to Map-View Code Injection.srt
4.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/1.1 Map-View Code Injection.pdf
663 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/2. Explanation of APIs Used in Map-View Code Injection.mp4
117 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/2. Explanation of APIs Used in Map-View Code Injection.srt
12.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/2.1 05-map-view_injection.zip
14 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/2.2 Notes on Map-View Code Injection.txt
2.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/6. Map-View Code Injection/3. Practical Walkthrough on Map-View Code Injection.srt
5.1 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/7. APC (Asynchronous Procedure Call) Injection/1. Introduction to APC Injection.srt
5.2 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/7. APC (Asynchronous Procedure Call) Injection/1.2 Asynchronous Procedure Call Injection.pptx
46.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/7. APC (Asynchronous Procedure Call) Injection/2. Explanation of API functions used in APC Injection.srt
4.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/7. APC (Asynchronous Procedure Call) Injection/2.1 06-apc_injection.zip
3.3 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/7. APC (Asynchronous Procedure Call) Injection/2.2 Notes on apc injection.txt
239 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/1. Introduction to Early Bird APC Injection.srt
5.4 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/1.1 Early Bird APC Injection.pdf
550.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/1.2 Early Bird APC Injection.pptx
75.2 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/2. Explanation of API functions used in Early Bird APC Injection.srt
7.9 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/2.1 07-earlybird-apc-injection.zip
12.9 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/2.2 Notes on early bird apc injection.txt
1012 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/8. Early Bird APC Injection/3. Practical Walkthrough on Early Bird APC Injection.srt
2.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/1. Introduction to Reflective Loading.srt
2.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/1.2 reflective loading.pptx
38.8 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/2. Explanation of the Reflective Loading Code.mp4
119.9 MB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/2. Explanation of the Reflective Loading Code.srt
10.6 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/2.1 08-reflective-loading.zip
326.2 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/2.2 pe file notes.txt
178 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/3. Practical Walkthrough on creating a Reflective-Loaded Trojan.srt
5 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/4. Obfuscating the Reflective Loader Strings.srt
9.2 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/5.1 notes on shellcode reflective DLL injection.txt
161 B
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/5.3 shellcode reflective DLL injection.pptx
38.7 KB
[TutsNode.com] - Malware Development 2 Advanced Injection and API Hooking/9. Reflective Loading Trojans/6. Practical Walkthrough on sRDI.srt