Udemy – Malware Development 2: Advanced Injection and API Hooking 2021-10
Udemy – Malware Development 2: Advanced Injection and API Hooking 2021-10 Downloadly IRSpace

Malware Development 2: Advanced Injection and API Hooking, This course is about more advanced techniques in Malware Development. This course builds on what you have learned in Malware Development and Reverse Engineering 1: The Basics. You will learn first-hand from a Malware Developers’ perspective what windows API functions are commonly used in malware and finally have a deeper understanding of malware so that you will have enhanced skills when doing malware analysis later. Learning Methodology: Build programs that simulate Windows Trojans and Reverse Engineer them. This will make you a better Reverse Engineer and Malware Analyst and also Penetration Tester. The best way to understand malware is to be a Malware Developer. Features: Some topics will contain two parts: programming and reversing.
In the programming parts we will be writing programs that simulate trojan behavior by using API functions typically found in malware. In the final section, there will be a Lab Project, where you will combine all the knowledge you learn to create a trojan that can survive a reboot and sniff for a disk encryption password and capture it to a file. Everything is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along. By the end of this course, you will have the basic skills to better understand how Malware works from the programmers’ point of view. This knowledge and skills are suitable for those aspiring to be Red Teamers. Even if you have no intention of creating malware, the insider knowledge and skills you gain from this course will make you a better security professional.
What you’ll learn
- How function address resolution works
- Advanced code injection techniques
- Build custom reflective binary
- Hooking APIs in memory
- Move between 32-bit and 64-bit processes
- Using IPC to control multiple process payloads
- Advanced DLL Injection techniques
- Heaven’s Gate Cross Injections
- Advanced Function Obfuscation
- Thread Context Injection
- Map-View Code Injection
- Asynchronous Procedure Call Injection
- Early Bird APC Injection
- Reflective Loading Trojans
- API Hooking Using the Detours Library
- Import Address Table (IAT) Hooking
Who this course is for
- Reverse Engineering and Malware Analysis Students
- Programmers who want to know how Malware is created
- Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path
- Penetration Testers and Ethical Hackers
Specificatoin of Malware Development 2: Advanced Injection and API Hooking
- Publisher : Udemy
- Teacher : Paul Chin
- Language : English
- Level : All Levels
- Number of Course : 53
- Duration : 6 hours and 38 minutes
Content of Malware Development 2: Advanced Injection and API Hooking
01 Introduction
02 Installing The Tools
03 Building EXE and DLL and Examining PE Structure
04 Embedding Shellcode Payloads in EXE files
05 Generating Shellcodes Using Metasploit in Kali Linux
06 Embedding Shellcode Payload in .RSRC Section and Analyzing with xdbg
07 Testing Unpacked Dumped Shellcode Payload Using Hexeditor and a C Program
08 Base64 Encoding of Shellcode Payload
09 Reverse Engineering Base64 Encoded Payloads
10 XOR Encryption of Payload
11 Reverse Engineering XOR Encryption
12 AES Encryption of Payload
13 Reverse Engineering AES Encryption Using CryptDecrypt
14 Testing Shellcode Using Shellcode Runner
15 Obfuscating Functions Using GetProcAddress and XOR Encryption
16 Reverse Engineering Function Obfuscation
17 Trojan Engineering Using Code Caves
18 Reverse Engineering Code Cave Trojans
19 Process Injection
20 Detecting Process Injection and Reverse Engineering it
21 Testing Process Injection Shellcode with ShellcodeRunnerInjected
22 DLL Injection
23 Detecting and Reverse Engineering DLL Injection
24 Creating a Stealth Trojan
25 Lab Project _ Creating a Trojan with Encrypted Payload and Injection Capability
26 Reverse Engineering the Lab Project Trojan
27 Anti Virus Evasion
28 Bonus Lecture
Requirements
- Windows PC
- Basic C Language
- Preferably already Completed Malware Development and Reverse Engineering 1: The Basics
Sample Clip
Installation Guide
Extract the files and watch with your favorite player
Subtitle : English
Quality: 720p
Download Links
File size
3.61 GB