Details
Knowing several techniques such as anti debugging, persistence, self protection, advanced code injection - Learn to apply techniques practically inside a penetration testing lab that simulates a real system. Gain experience in analyzing the system and discovering vulnerabilities to exploit them in Malware programming. - Knowing the techniques of raising powers and applying them in practice. You will be able to program Malware from scratch. It has the ability to bypass defense systems and stability in the system, in addition to obtaining higher powers in the system.
What you'll learn
- Chapter 1:
- • Introduction CSMD 2 .
- • Malware lifecycle.
- • First Stage.
- • Second Stage.
- • Third Stage.
- Chapter 2:
- • Introduction to malware persistence
- • Startup Folder technique.
- • Run/RunOnce Registry technique.
- • WinLogon technique.
- • Shortcut infection.
- • Persistence automation
- Chapter 3:
- • Code injection review
- • Alternative classical injection.
- • Thread Hijacking
- • MapView injection
- • APC injection.
- • Advanced APC injection
- Chapter 4:
- • Introduction to malware self-protection.
- • Introduction to Anti debugging techniques.
- • VM artifacts.
- • Identification via Processes.
- • Libs enumeration and detection.
- • Computer username identification
- • Parent process detection.
- Chapter 5 Bonus:
- • PE-In-depth