IT & Software

Malware Development and Reverse Engineering 1 : The Basics

To better understand reverse engineering, malware analysis, and penetration testing, learn basic programming skills.

What you'll learn

  • Basic Programming for Malware Analysis
  • Basic Programming Knowledge for Reverse Engineering
  • Creating and Compiling EXE and DLLs
  • Creating Windows Shellcode Using Metasploit on Kali Linux
  • Analyzing memory of a running malware
  • Injecting Shellcode into Running Processes
  • Creating Remote Thread
  • Encryption of Payloads and Function Call String Parameters
  • Hiding Shellcode Payloads in Executable Files
  • Obfuscating Function Calls
  • Malware Stealth Strategies
  • Encoding of Payloads
  • Trojan Development Life Cycle
  • How Anti Virus Works Under the Hood
  • Using Yara to Study Malware Signatures
  • Anti Virus Evasion Techniques
  • Dynamic Runtime API Loading
  • Windows API used in Malware

Requirements

  • Windows PC
  • Basic C Language
  • Basic Linux commands

Description

Many malware researchers reverse engineer malware without understanding why it is being reverse engineered. Only the how's are known to them. This course was developed to address that knowledge gap.

You'll discover what Windows API functions are often utilized in malware firsthand from a Malware Developer's perspective, and why you need to track them while reversing malware.

Learning Methodology:

  1. Build programs that simulate Windows Trojans and Reverse Engineer them.
  2. This will make you a better Reverse Engineer and Malware Analyst and also Penetration Tester.
  3. The best way to understand malware is to be a Malware Developer.
Trending Now:   Windows Server 2019 - Go from Zero to Hero (2020)

Features:

  • Every topic will contain two parts:  programming and reversing.
  • In the programming parts we will be writing programs that simulate trojan behavior by using API functions typically found in malware.
  • Then, in the reversing part, we take the programs that we wrote and perform reverse engineering on it
  • In this way, you will, for the first time, really understand why malware analyst do what they do when reversing a piece of malware

What you will learn:

  • How to compile and build executables and dynamic link libraries (DLL)
  • Windows API used in Malware
  • Creating shellcode using Metasploit on Kali Linux
  • Hiding shellcode payload in executable files
  • How to analyze and inspect memory of a running malware
  • Injecting Shellcode into running processes
  • Creating Remote Threads
  • Encryption of Payloads and Function Call String Parameters
  • Obfuscation of Function Calls
  • Malware Stealth Strategies
  • Encoding of Payloads
  • Trojan Development Life Cycle
  • How Anti Virus works under the hood
  • Using Yara to study malware signatures
  • Anti Virus Evasion Techniques
  • Dynamic Runtime API Loading
  • and more

In this course, we'll use free tools like Oracle Virtual Box and Flare-VM, as well as the Community Edition of Microsoft Visual Studio 2019 C++. We'll also use the Virtual Box to install Kali Linux and learn how to use Metasploit to produce Windows shellcode. Everything is quite useful. There will be no dull theories or lectures. It's more like walkthroughs that you can copy and follow along with.

Trending Now:   CCNP All-in-1 Video Boot Camp With Chris Bryant

By the completion of this course, you'll have the fundamental knowledge needed to better grasp how malware works from the perspective of programmers. Those seeking to be Red Teamers will benefit from this information and skills.

Furthermore, having hands-on experience with malware production will help you grasp how to reverse engineer malware. When reversing and studying a trojan, for example, we frequently place breakpoints on potentially harmful API function calls – but we have no idea why. I'll show you why in this course. By the completion of this course, you will have a strong foundation for your future endeavors.

Suitable for:

  • Reverse Engineering and Malware Analysis Students
  • Programmers who want to know how Malware is created
  • Students planning on entering Malware Analysis and Reverse Engineering, or Penetration Testers as a Career Path
  • Penetration Testers and Ethical Hackers

Prerequisite:

  • Windows PC
  • Basic C Language
  • Basic Linux commands

Who this course is for:

  • Reverse Engineering and Malware Analysis Students
  • Programmers who want to know how Malware is created
  • Students planning on entering Malware Analysis and Reverse Engineering or Penetration Testers as a Career Path
  • Penetration Testers and Ethical Hackers

Created by Paul Chin
Last updated 9/2021
English
Size: 4.4GB

126 KB

https://www.udemy.com/course/malware-development-1-basics/

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Courses

Back to top button

JOIN US ON TELEGRAM

Join our telegram channel and be the first to know when we post/update courses and also when we share awesome deals & freebies.