kingers Posted May 28 Report Share Posted May 28 11.39 GB | 41min 55s | mp4 | 1920X1080 | 16:9Genre:eLearning |Language:EnglishFiles Included :1 - Introduction.mp4 (7.2 MB)55 - What is lsass process in windows.mp4 (26.46 MB)56 - How do we steal the password from lsass process in windows.mp4 (54.58 MB)57 - Understanding Windows API functions used in finding the target process id.mp4 (75.62 MB)58 - Understanding the program logic of process id lsassexe finding program.mp4 (135.63 MB)59 - Practical demonstration of finding the process id of lsass in Windows.mp4 (38.26 MB)60 - Understanding the program flow of password stealing program from lsass process.mp4 (73.61 MB)61 - Practical demonstration of dumping the memory of lsass process from our malware.mp4 (105.3 MB)62 - Extracting the password hashes from the lsass dump file.mp4 (67.52 MB)2 - Lab setup 1.mp4 (12.19 MB)10 - Understanding PE sections in windows.mp4 (160.92 MB)11 - Understanding token handle and thread of a process.mp4 (71.96 MB)12 - Understanding token information in process hacker.mp4 (295.09 MB)13 - Understanding handle table information.mp4 (43.21 MB)14 - Understanding threads in process hacker.mp4 (53.91 MB)3 - What is a malware and its types.mp4 (12.16 MB)4 - Introduction to PE file structure.mp4 (217.31 MB)5 - Understanding MSDOS Header in PE file of windows.mp4 (532.63 MB)6 - Understanding DOS stub in PE file of windows.mp4 (160.53 MB)7 - PE Header section structure Basics.mp4 (187.54 MB)8 - Understanding PE Headers subsections Signature File Header and OptionalHeader.mp4 (979.85 MB)9 - Understanding PE Section Headers.mp4 (732.7 MB)15 - What is a Handle in windows.mp4 (602.77 MB)16 - Windows Handle example Finding out running program using windows handle.mp4 (103.35 MB)17 - Windows Handle example Hiding minimizing maximizing running program.mp4 (108.54 MB)18 - Lab configuration in Malware development machine.mp4 (242.5 MB)19 - Deep diving into CreateProcess function and understanding its input parameters.mp4 (702.27 MB)20 - Creating a process using CreateProcess function.mp4 (381.51 MB)21 - How can we hide a program using STARTUPINFO structure flags.mp4 (93.68 MB)22 - Hiding program practical demonstration.mp4 (154.82 MB)23 - Hiding program using CreateProcess function flags in windows.mp4 (148.08 MB)24 - Hiding console programs in windows.mp4 (91.02 MB)25 - Understanding inherit handles in CreateProcess function in windows.mp4 (509.76 MB)26 - Practical demonstration of inherit handle in CreateProcess function.mp4 (510.08 MB)27 - How to set custom environment variable for child process in windows.mp4 (66.11 MB)28 - How to set custom working directory for child process in CreateProcess function.mp4 (79.05 MB)29 - How to open a process using OpenProcess windows api function.mp4 (26.42 MB)30 - Understanding CreateThread function working in windows.mp4 (57.37 MB)31 - Practical demonstration of thread creation with CreateThread windows function.mp4 (106.71 MB)32 - How to execute a shellcode with CreateThread function.mp4 (112.23 MB)33 - Practical demonstration of executing a shellcode with CreateThread function.mp4 (225.82 MB)34 - Understanding ANSI and UNICODE in windows programming.mp4 (5.34 MB)35 - Understanding how to inject code into other running processes in windows.mp4 (130.57 MB)36 - Practical demonstration of malware code injection into other processes in window.mp4 (74.53 MB)37 - Understanding DLL injection attack in windows.mp4 (173.17 MB)38 - Practical demonstration of DLL injection attack in windows.mp4 (58.08 MB)39 - Understanding DLL hijacking concept in windows.mp4 (47.7 MB)40 - dll-hijacking.zip (130.17 KB)40 - Practical demonstration of DLL hijacking in windows.mp4 (99.47 MB)41 - Understanding APC code injection technique.mp4 (249.87 MB)42 - APC injection practical demonstration in windows.mp4 (168.14 MB)43 - Malware persistence using registry entry.mp4 (138.45 MB)44 - Practical demonstration of Malware persistence using registry entry.mp4 (263.52 MB)45 - Malware persistence via Winlogon.mp4 (43.55 MB)46 - Practical demonstration of malware persistence via Winlogon.mp4 (279.31 MB)47 - Understanding malware persistence by creating Malicious Windows Services.mp4 (157.69 MB)48 - Practical demonstration of malware persistence via creating Windows Service.mp4 (639.93 MB)49 - Understanding basic token theft concept.mp4 (79.99 MB)50 - How to enable SeDebugPrivilege understanding basic concept.mp4 (50.06 MB)51 - Understanding the working of enable SeDebugPrivilege program.mp4 (242.05 MB)52 - Practical demonstration of enabling SeDebugPrivilege of a program token.mp4 (90.78 MB)53 - Understanding the basic steps of how to steal token of winlogon process.mp4 (16.83 MB)54 - Practical demonstration of stealing token of winlogon process.mp4 (284.93 MB)]ScreenshotRapidGatorhttps://rapidgator.net/file/e9c0007d6fc9c9b48b39ab1562a2e08d/https://rapidgator.net/file/9cc1209310089b2a07c9f07a9054c95d/https://rapidgator.net/file/04d4855373caac73809c6b9842e7ac44/https://rapidgator.net/file/74e6fdd4dde568b3f737e0c011150c7c/https://rapidgator.net/file/fa6c3c1b580b1fffd1f090efe8415cfd/https://rapidgator.net/file/e3bbcc6b449a5ce0c89a4a81120e9c03/https://rapidgator.net/file/e280365e1e3793574e3e903e953bc010/https://rapidgator.net/file/c7e016ac0cfa292f39f9016de5d401fe/https://rapidgator.net/file/2afd8855267b0b7c1144e2f72ab061be/https://rapidgator.net/file/07b8394e755d1f2aadcd1132cccbea4f/https://rapidgator.net/file/000015601b5b9a1b5612ffa5dba9ed5e/NitroFlarehttps://nitroflare.com/view/42BF579107F2B99/https://nitroflare.com/view/E3A18F01D58CEC1/https://nitroflare.com/view/A12934927D9A55B/https://nitroflare.com/view/268F5E6D1AA36F9/https://nitroflare.com/view/5F3BBC3C7A256A4/https://nitroflare.com/view/42C7BF98EBD049B/https://nitroflare.com/view/7C13F20D6D13820/https://nitroflare.com/view/62B62E170666514/https://nitroflare.com/view/353BB703DBD50CF/https://nitroflare.com/view/CCA87318FADCFA3/https://nitroflare.com/view/C72C9C8DB010146/ Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now