Помощь
Добавить в избранное
Музыка Dj Mixes Альбомы Видеоклипы Топ Радио Радиостанции Видео приколы Flash-игры
Музыка пользователей Моя музыка Личный кабинет Моя страница Поиск Пользователи Форум Форум

   Сообщения за день
Вернуться   Bisound.com - Музыкальный портал > Программы, музыкальный soft

Ответ
 
Опции темы
  #1  
Старый 21.05.2025, 23:39
hopaxom869@amxyy.com hopaxom869@amxyy.com вне форума
Живу я здесь
 
Регистрация: 25.08.2024
Сообщений: 20,012
По умолчанию Advanced Malware Techniques



Advanced Malware Techniques
Published 5/2025
Created by Daniel N
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: All | Genre: eLearning | Language: English | Duration: 14 Lectures ( 5h 37m ) | Size: 3.1 GB
advanced malware development techniques
What you'll learn


Develop Malware using advanced techniques
Little-accessed research sources
Perform case studies on real malware
Red Team Operations techniques
Requirements
Programming in C/C++ and Assembly
Computer Networks
Operating Systems (Windows more specifically)
Description
In this course, I will show advanced techniques used by real malware that I have already analyzed. In practice, Analyzing malware is not that easy. First, finding a good sample is a bit tedious and, depending on the techniques and number of stages, it can take a long time. I will also be adding content related to offensive security focused on red team operations in which I have already participated, talking about infrastructure, networks, organization and computer architecture applied to this. The course covers advanced cryptography techniques, protocol customization, process injection techniques, obfuscation, how to abuse internal Windows mechanisms to elevate privileges and escape defenses, programming command and control servers for exfiltration in multiple protocols, polymorphism and programming malware in multiple stages for each "nature" of malware, such as ransomware, worms, stealers, etc...I would like to emphasize that this course is for more technical users who already have an idea about the topics covered, however, the main objective is to arouse a certain curiosity for research on the topics as well.My microphone is also not one of the best, so if a class is poorly explained in a technical way or has very very very bad audio, please do not hesitate to comment so that I can re-record it, unfortunately I do not have much time for video editing, but the idea is to be technical and objective. I hope you enjoy the content, I will be doing my best.
Who this course is for
People who work with Information Security

Ответить с цитированием
Ответ



Ваши права в разделе
Вы не можете создавать темы
Вы не можете отвечать на сообщения
Вы не можете прикреплять файлы
Вы не можете редактировать сообщения

BB коды Вкл.
Смайлы Вкл.
[IMG] код Вкл.
HTML код Выкл.
Быстрый переход


Музыка Dj mixes Альбомы Видеоклипы Каталог файлов Радио Видео приколы Flash-игры
Все права защищены © 2007-2025 Bisound.com Rambler's Top100