This course will teach you how to become a better ethical hacker, pentester and red teamer by learning malware development in Windows.
RED TEAM Operator: Malware Development Essentials Course
Contents:-
Intro and Setup
Short introduction to malware development and setting up our test...
Learn how to avoid modern endpoint protection technology with well-known, less known, and in-house developed techniques.
Contents
Intro and Setup
Course Introduction
Development VM Setup
RTO-WinEva.ova
WEv.zip
Essentials
Modern Detection Tech
Evasion Development Rules
Binary Entropy
Module...
A course about breaking and bypassing the Windows security model. Escalating privileges with 20 different techniques. From non-admin to SYSTEM.
Contents
Intro and Setup
Introduction to Windows Security
Intro Addendum
Course VM Setup
RTO-LPE.ova
RTO-LPE.zip
Credentials
"Low Hanging Passwords"...
27 persistence methods in Windows. From basic to advanced, unique and known, used in malware like Stuxnet or Flame and by nation-state threat actors, including EquationGroup, Turla and APT29.
Contents
Intro and Setup
Introduction to Windows Persistence
Intro Addendum
Course VM Setup...
More advanced malware development techniques in Windows, including: API hooking, 32-/64-bit migrations, reflective binaries and more.
Contents
Intro and Setup
Course Introduction
Development VM Setup
RTO-MalDev2.ova
RTO-MDI.zip
PE madness
Revisiting PE file format
Walking through Export...