0x12 Dark Development
Home
Courses
Introduction Windows Malware Development
Building a Custom Remote Access Trojan (RAT)
Learning C++ for Malware Development
Introduction to Malware Analysis
Modules
Database
Consulting
Login
Register
Home
Malware Development
Introduction Windows Malware Development
Introduction Windows Malware Development
Curriculum
27 Sections
58 Lessons
Lifetime
Expand all sections
Collapse all sections
Introduction
2
1.1
Introduction
1.2
Setup
Theory
6
2.1
Processes
2.2
Threads
2.3
UserLand vs KernelLand
2.4
PE Structure
2.5
Windows API Families
2.6
What AV & EDR Solutions Detect in Offensive Operations
Shellcode Generator
2
3.1
Generating malicious payloads with MSFVenom
3.2
Generating shellcode with Donut
Shellcode Execution
4
4.1
Shellcode Introduction
4.2
Classic Shellcode Execution
4.3
Enum Functions to Execute Shellcode
4.4
Shellcode Execution via Timer
Shellcode Encryption
2
5.1
XOR
5.2
AES
Process Injection
4
6.1
Classic Process Injection
6.2
Asynchronous Procedure Call Injection
6.3
Thread Hijacking Injection
6.4
FindWindow Injection
DLL Injection
2
7.1
DLL Injection
7.2
Persistent DLL Injection
Inter Process Connection
4
8.1
IPC Introduction
8.2
Mutex
8.3
Pipe
8.4
Registry
Downloader
1
9.1
Downloader Malware
Multiplatform
1
10.1
Multiplatform Malware
Malware as Service
1
11.1
Malware as Service
Persistence
3
12.1
Persistence Introduction
12.2
Perisistence via Run Registry Key
12.3
Persistence via Application Event
Import Address Table
1
13.1
Bypass Import Address Table
Sandbox and Virtual Machines
1
14.1
Bypass Sandbox and Virtual Machines
String Encryption
1
15.1
Encrypt Strings with SkCrypter
Microsoft Signatures
1
16.1
Steal valid Microsoft Signatures
Reverse Shell
1
17.1
Reverse Shell with C++
Keylogger
1
18.1
Keylogger
Windows Defender Killer
1
19.1
Windows Defender Killer
Privilege Escalation
4
20.1
Privilege Escalation Intro
20.2
Escalate Privileges via FodHelper.exe
20.3
Escalate Privileges via Token Manipulation
20.4
Privilege Escalatation Class Final Project
API Hooking
3
21.1
API Hooking Setup
21.2
API Hooking Explaination
21.3
RDP Credential Stealer
Parent PID Spoofing
1
22.1
PPID Spoofing
Process Token
3
23.1
Process Token Introduction
23.2
Token Theft
23.3
Process Token Impersonation
Dump Lsass.exe
1
24.1
Dump lsass.exe
Malicious Office Documents
3
25.1
Malicious Office Macros
25.2
Shellcode Injection in Office Macros
25.3
Configuring metasploit for VBA
Botnet Infrastructure
3
26.1
Botnet Final Project Introduction
26.2
Botnet Server Side
26.3
Botnet Victim Side
Conclusions
1
27.1
Conclusions
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content