![]() |
Course Malware Development
![]() Course Malware Development Published 7/2025 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 4.85 GB | Duration: 11h 9m Advanced Ransomware Development What you'll learn The student will have the knowledge to develop advanced malware The complete course has 14 theoretical and practical modules, starting with the introduction to Ransomware through to the complete development of the malware. The course teaches theoretically and practically the development and operation of a Ransowmare With the knowledge from this course, a student will have knowledge about how the most famous software currently available works. Requirements You don't need knowledge, just a desire to learn. Description 1. PRESENTATIONHere we will begin to teach the history of Ransomware, how itemerged, first reports, groups, victims and much more.2. Golang LogicFinishing the theoretical knowledge, we move on to practice, westart by learning the basics of the Golang language, variables,functions, modules, channel, etc3. File ManipulationNow that we know the basics of Golang, let's dive in and learnabout file manipulation, reading, writing, listing, permissions, etc.Since this is a Ransomware course, it's important to know aboutfiles, don't you agree?4. HashHere we will learn a little about Hash, md5, base64, sha256among others.5. Advanced encryptionIn this module, we will start to make the content more difficult, thestudent will learn in depth the basic and advanced knowledgeabout symmetric and asymmetric cryptography, many used infamous Ransomware, AES, RSA, CHACHA20.6. SandboxLet's learn a little about sandbox environments for evasionprocesses, creating several functions that we can detect if ourmalware is running in test environments.7. Running processesIn real ransomware, there is a list of running processes, this stepis important, the objective is to know which processes we must killfor the malware to run.8. InfosystemIn this module, we will talk about collecting information from our"Targets", hostname, username, addresses, permission, OS.9. About LogsIn this module, we will learn about logs stored on our targets andhow we can "eliminate" them, an important process in the attackto erase traces.10. READMEHere we will learn how to create our famous warning banner, theone that all ransomware has: "All your files have been encrypted,do not attempt to recover them..." Malware Developers, Red Team, Pentesters, Reverse Engineers. Цитата:
|
Часовой пояс GMT +3, время: 16:51. |
vBulletin® Version 3.6.8.
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Перевод: zCarot