usarmy Posted December 27, 2021 Posted December 27, 2021 (edited) MALDEV2 (Malware Development 2: Advanced Injection and API Hooking) This course is about more advanced techniques in Malware Development. This course builds on what you have learned in Malware Development and Reverse Engineering 1: The Basics, by extending your development skills with: advanced function obfuscation by implementing customized API calls more advanced code injection techniques advanced DLL injection techniques understanding how reflective binaries work and building custom reflective DLLs hijacking and camouflaging trojan shellcodes inside legitimate running processes memory hooking to subvert the normal flow of a running process exploiting the vulnerability in 32- and 64-bit process migrations hooking the Import AddressTables (IAT) to replace it with your own functions using inter process communication to control execution of multiple trojan processes hooking API calls and replacing them with your own customized function implementing DLL injection and API hooking to sniff and capture disk encryption passwords advanced AV evasion and obfuscation techniques and more... You will learn first-hand from a Malware Developers’ perspective what windows API functions are commonly used in malware and finally have a deeper understanding of malware so that you will have enhanced skills when doing malware analysis later. Learning Methodology: Build programs that simulate Windows Trojans and Reverse Engineer them. This will make you a better Reverse Engineer and Malware Analyst and also Penetration Tester. The best way to understand malware is to be a Malware Developer. Features: Some topics will contain two parts: programming and reversing. In the programming parts we will be writing programs that simulate trojan behavior by using API functions typically found in malware. In the final section, there will be a Lab Project, where you will combine all the knowledge you learn to create a trojan that can survive a reboot and sniff for a disk encryption password and capture it to a file. Everything is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along. By the end of this course, you will have the basic skills to better understand how Malware works from the programmers' point of view. This knowledge and skills are suitable for those aspiring to be Red Teamers. Even if you have no intention of creating malware, the insider knowledge and skills you gain from this course will make you a better security professional. Also, having practical knowledge of malware development will give you a better understanding of how to reverse engineer malware. By the end of this course, you would have gained a solid foundation for understanding how hackers can exploit windows API to inject malicious code into other processes. Suitable for: Reverse Engineering and Malware Analysis Students Programmers who want to know how Malware is created Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path Penetration Testers and Ethical Hackers Prerequisite: Windows PC Basic C Language Preferably already Completed Malware Development and Reverse Engineering 1: The Basics Link:- https://send.cm/tpgzq2o5p3nq or https://usersdrive.com/l9fzcpnbcvs7.html Torrent:- https://send.cm/d/5aDB or https://usersdrive.com/a8r7g74exmp5.html Edited December 27, 2021 by usarmy
kao Posted December 27, 2021 Posted December 27, 2021 Course created by Paul Chin. Don't waste your time downloading that crap... 6
Kurapica Posted December 29, 2021 Posted December 29, 2021 On 12/27/2021 at 4:29 PM, kao said: Course created by Paul Chin. Don't waste your time downloading that crap... Never heard of the dude, can you elaborate more please ?
kao Posted December 29, 2021 Posted December 29, 2021 Search the board, man... 😉 Paul Chin is author of crackinglessons.com where he sells his "extremely deep knowledge" of randomly clicking buttons in OllyDbg, x64dbg and dnSpy. 2
Xyl2k Posted December 30, 2021 Posted December 30, 2021 "Software Ethical Hacking – How to Crack Software Legally" ah yeah i remember that crap now 2
Kurapica Posted December 30, 2021 Posted December 30, 2021 hehe ! then I should start writing a new series on how to crack CUDA GPU code with Notepad++ ! I hope it won't be a misleading title for marketing 2
zeezoom Posted July 20, 2022 Posted July 20, 2022 On 12/27/2021 at 8:29 PM, kao said: Course created by Paul Chin. Don't waste your time downloading that crap... Hi, I wanna start learning the basic of RE, especially Android app RE. Do you have a better course than Paul Chin's to recommend ?
kao Posted July 20, 2022 Posted July 20, 2022 You could start by looking at these 2 free courses: https://malwareunicorn.org/workshops/re101.html https://www.ragingrock.com/AndroidAppRE/ + https://www.youtube.com/watch?v=BijZmutY0CQ Both are focused on legit activity like malware reversing. There are more courses on this list but I'm not sure about the quality: https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd 1
zeezoom Posted July 21, 2022 Posted July 21, 2022 23 hours ago, kao said: You could start by looking at these 2 free courses: https://malwareunicorn.org/workshops/re101.html https://www.ragingrock.com/AndroidAppRE/ + https://www.youtube.com/watch?v=BijZmutY0CQ Both are focused on legit activity like malware reversing. There are more courses on this list but I'm not sure about the quality: https://gist.github.com/IdanBanani/5be0442ad390f89259b494098f450bfd Thank you so much
X0rby Posted April 28, 2023 Posted April 28, 2023 (edited) On 7/20/2022 at 5:04 AM, zeezoom said: Paul Chin This guy is not ethical at all, he's stealing everyone's tutorials without even giving credit, he even uses the same samples they use in the tuto that he steals and then sells it ! He even steals Lena's tutorials and uses the same targets from the early 2000's ! and he doesn't know even what he is doing, just a copy-and-paste noob.. a thief! Edited April 28, 2023 by X0rby
xvens Posted April 28, 2023 Posted April 28, 2023 50 minutes ago, X0rby said: This guy is not ethical at all, he's stealing everyone's tutorials without even giving credit, he even uses the same samples they use in the tuto that he steals and then sells it ! He even steals Lena's tutorials and uses the same targets from the early 2000's ! and he doesn't know even what he is doing, just a copy-and-paste noob.. a thief! is this file clean to download ? 52 minutes ago, X0rby said: This guy is not ethical at all, he's stealing everyone's tutorials without even giving credit, he even uses the same samples they use in the tuto that he steals and then sells it ! He even steals Lena's tutorials and uses the same targets from the early 2000's ! and he doesn't know even what he is doing, just a copy-and-paste noob.. a thief! because i don't have 9$ to buy the course
boot Posted April 28, 2023 Posted April 28, 2023 Using the hook API for DLL hijacking or injection is a practical and relatively challenging technique...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now