Jump to content

Malware Development for Ethical Hackers and Pentesters


Recommended Posts

537368816_que-es-udemy-analisis-opiniones.jpg
11.39 GB | 41min 55s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English



Files Included :
1 - Introduction.mp4 (7.2 MB)
55 - What is lsass process in windows.mp4 (26.46 MB)
56 - How do we steal the password from lsass process in windows.mp4 (54.58 MB)
57 - Understanding Windows API functions used in finding the target process id.mp4 (75.62 MB)
58 - Understanding the program logic of process id lsassexe finding program.mp4 (135.63 MB)
59 - Practical demonstration of finding the process id of lsass in Windows.mp4 (38.26 MB)
60 - Understanding the program flow of password stealing program from lsass process.mp4 (73.61 MB)
61 - Practical demonstration of dumping the memory of lsass process from our malware.mp4 (105.3 MB)
62 - Extracting the password hashes from the lsass dump file.mp4 (67.52 MB)
2 - Lab setup 1.mp4 (12.19 MB)
10 - Understanding PE sections in windows.mp4 (160.92 MB)
11 - Understanding token handle and thread of a process.mp4 (71.96 MB)
12 - Understanding token information in process hacker.mp4 (295.09 MB)
13 - Understanding handle table information.mp4 (43.21 MB)
14 - Understanding threads in process hacker.mp4 (53.91 MB)
3 - What is a malware and its types.mp4 (12.16 MB)
4 - Introduction to PE file structure.mp4 (217.31 MB)
5 - Understanding MSDOS Header in PE file of windows.mp4 (532.63 MB)
6 - Understanding DOS stub in PE file of windows.mp4 (160.53 MB)
7 - PE Header section structure Basics.mp4 (187.54 MB)
8 - Understanding PE Headers subsections Signature File Header and OptionalHeader.mp4 (979.85 MB)
9 - Understanding PE Section Headers.mp4 (732.7 MB)
15 - What is a Handle in windows.mp4 (602.77 MB)
16 - Windows Handle example Finding out running program using windows handle.mp4 (103.35 MB)
17 - Windows Handle example Hiding minimizing maximizing running program.mp4 (108.54 MB)
18 - Lab configuration in Malware development machine.mp4 (242.5 MB)
19 - Deep diving into CreateProcess function and understanding its input parameters.mp4 (702.27 MB)
20 - Creating a process using CreateProcess function.mp4 (381.51 MB)
21 - How can we hide a program using STARTUPINFO structure flags.mp4 (93.68 MB)
22 - Hiding program practical demonstration.mp4 (154.82 MB)
23 - Hiding program using CreateProcess function flags in windows.mp4 (148.08 MB)
24 - Hiding console programs in windows.mp4 (91.02 MB)
25 - Understanding inherit handles in CreateProcess function in windows.mp4 (509.76 MB)
26 - Practical demonstration of inherit handle in CreateProcess function.mp4 (510.08 MB)
27 - How to set custom environment variable for child process in windows.mp4 (66.11 MB)
28 - How to set custom working directory for child process in CreateProcess function.mp4 (79.05 MB)
29 - How to open a process using OpenProcess windows api function.mp4 (26.42 MB)
30 - Understanding CreateThread function working in windows.mp4 (57.37 MB)
31 - Practical demonstration of thread creation with CreateThread windows function.mp4 (106.71 MB)
32 - How to execute a shellcode with CreateThread function.mp4 (112.23 MB)
33 - Practical demonstration of executing a shellcode with CreateThread function.mp4 (225.82 MB)
34 - Understanding ANSI and UNICODE in windows programming.mp4 (5.34 MB)
35 - Understanding how to inject code into other running processes in windows.mp4 (130.57 MB)
36 - Practical demonstration of malware code injection into other processes in window.mp4 (74.53 MB)
37 - Understanding DLL injection attack in windows.mp4 (173.17 MB)
38 - Practical demonstration of DLL injection attack in windows.mp4 (58.08 MB)
39 - Understanding DLL hijacking concept in windows.mp4 (47.7 MB)
40 - dll-hijacking.zip (130.17 KB)
40 - Practical demonstration of DLL hijacking in windows.mp4 (99.47 MB)
41 - Understanding APC code injection technique.mp4 (249.87 MB)
42 - APC injection practical demonstration in windows.mp4 (168.14 MB)
43 - Malware persistence using registry entry.mp4 (138.45 MB)
44 - Practical demonstration of Malware persistence using registry entry.mp4 (263.52 MB)
45 - Malware persistence via Winlogon.mp4 (43.55 MB)
46 - Practical demonstration of malware persistence via Winlogon.mp4 (279.31 MB)
47 - Understanding malware persistence by creating Malicious Windows Services.mp4 (157.69 MB)
48 - Practical demonstration of malware persistence via creating Windows Service.mp4 (639.93 MB)
49 - Understanding basic token theft concept.mp4 (79.99 MB)
50 - How to enable SeDebugPrivilege understanding basic concept.mp4 (50.06 MB)
51 - Understanding the working of enable SeDebugPrivilege program.mp4 (242.05 MB)
52 - Practical demonstration of enabling SeDebugPrivilege of a program token.mp4 (90.78 MB)
53 - Understanding the basic steps of how to steal token of winlogon process.mp4 (16.83 MB)
54 - Practical demonstration of stealing token of winlogon process.mp4 (284.93 MB)]
Screenshot
DdcRjnFP_o.jpg



RapidGator

https://rapidgator.net/file/e9c0007d6fc9c9b48b39ab1562a2e08d/
https://rapidgator.net/file/9cc1209310089b2a07c9f07a9054c95d/
https://rapidgator.net/file/04d4855373caac73809c6b9842e7ac44/
https://rapidgator.net/file/74e6fdd4dde568b3f737e0c011150c7c/
https://rapidgator.net/file/fa6c3c1b580b1fffd1f090efe8415cfd/
https://rapidgator.net/file/e3bbcc6b449a5ce0c89a4a81120e9c03/
https://rapidgator.net/file/e280365e1e3793574e3e903e953bc010/
https://rapidgator.net/file/c7e016ac0cfa292f39f9016de5d401fe/
https://rapidgator.net/file/2afd8855267b0b7c1144e2f72ab061be/
https://rapidgator.net/file/07b8394e755d1f2aadcd1132cccbea4f/
https://rapidgator.net/file/000015601b5b9a1b5612ffa5dba9ed5e/

NitroFlare

https://nitroflare.com/view/42BF579107F2B99/
https://nitroflare.com/view/E3A18F01D58CEC1/
https://nitroflare.com/view/A12934927D9A55B/
https://nitroflare.com/view/268F5E6D1AA36F9/
https://nitroflare.com/view/5F3BBC3C7A256A4/
https://nitroflare.com/view/42C7BF98EBD049B/
https://nitroflare.com/view/7C13F20D6D13820/
https://nitroflare.com/view/62B62E170666514/
https://nitroflare.com/view/353BB703DBD50CF/
https://nitroflare.com/view/CCA87318FADCFA3/
https://nitroflare.com/view/C72C9C8DB010146/



Link to comment
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...