Malware Development 1: The Basics (MALDEV1)
Dive deep into malware analysis by learning from a malware developer's perspective. Create, simulate, and reverse-engineer Windows Trojans to enhance your skills in malware analysis!
Payment Methods
1. Credit Card: Click the Buy $9.00 button above
2. Paypal: Click this link
Many malware analysts perform reverse engineering on malware without knowing the why’s. They only know the how’s. To fill that knowledge gap, I have created this course.
You will learn first-hand from a Malware Developers’ perspective what windows API functions are commonly used in malware and finally understand how to trace them when reversing malware.
Learning Methodology:
Build programs that simulate Windows Trojans and Reverse Engineer them.
This will make you a better Reverse Engineer and Malware Analyst and also Penetration Tester.
The best way to understand malware is to be a Malware Developer.
Features:
Every topic will contain two parts: programming and reversing.
In the programming parts we will be writing programs that simulate trojan behavior by using API functions typically found in malware.
Then, in the reversing part, we take the programs that we wrote and perform reverse engineering on it
In this way, you will, for the first time, really understand why malware analyst do what they do when reversing a piece of malware
What you will learn:
We will be using free tools in this course, including Oracle Virtual Box and Flare-VM and the Community Edition of Microsoft Visual Studio 2019 C++. We will also install Kali Linux in the Virtual Box for learning how to use Metasploit to generate windows shellcode. Everything is highly practical. No boring theory or lectures. More like walk-throughs which you can replicate and follow along.
By the end of this course, you will have the basic skills to better understand how Malware works from the programmers’ point of view. This knowledge and skills are suitable for those aspiring to be Red Teamers.
Also, having practical knowledge of malware development will give you a better understanding of how to reverse engineer malware. For example, when reversing and analyzing a trojan, we usually put breakpoints of dangerous API functions calls – but don’t know why we do it. Now, in this course, I will show you the reasons for it. By the end of this course, you would have gained a solid foundation for understanding why and how malware reverse engineering works.
Suitable for:
Prerequisite:
Who this course is for:
Introduction to the course
FREE PREVIEWHow To Get Help
Please use Windows 10 or 11
Installing a virtual machine
Configuring the virtual machine
Installing FlareVM
Installing Microsoft Visual Studio 2019
Installing Kali Linux (for generating shellcode)
Creating a shared folder on kali
Intro to embedding shellcode payloads
Embedding shellcode payloads in text section
Embedding shellcode payload in data section
Intro to embedding shellcode in RSRC section
FREE PREVIEWCompiling shellcode in resource section and xdbg analysis