Rootkit And Stealth Software Development

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101

Last updated 2022-01-10 | 4.5

- Over 30 lectures and 10 hours of content!
- Lectures in PDF + Live Video Training
- Free source code package to download

What you'll learn

Over 30 lectures and 10 hours of content!
Lectures in PDF + Live Video Training
Free source code package to download
How to create shellcode
How to inject code
How to hide processes
files
directories and registry entries
How to keep a rootkit in a system
How to create a backdoor
How to create an invisible keylogger and remote console
How to make a screenshot
Creating undetectable applications
How to deceive Anti-Virus applications
How to use anti-emulation techniques
How to bypass a firewall
How to create a rootkit detector
How to protect against rootkits

* Requirements

* interest in ITsec and ethical hacking
* some IT and programming basics (C/C++)

Description

  • Over 30 lectures and 10 hours of content!
  • Lectures in PDF + Live Video Training
  • Free source code package to download
  • How to create shellcode
  • How to inject code
  • How to hide processes, files, directories and registry entries
  • How to keep a rootkit in a system
  • How to create a backdoor
  • How to create an invisible keylogger and remote console
  • How to make a screenshot
  • Creating undetectable applications
  • How to deceive Anti-Virus applications
  • How to use anti-emulation techniques
  • How to bypass a firewall
  • How to create a rootkit detector
  • How to protect against rootkits

Course content

12 sections • 40 lectures

Welcome to the course Preview 00:05

Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits Preview 00:07

Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits, What you need to know to start, Compatibility and current code version, Further reading

Introduction and setup - VIDEO TRAINING Preview 26:12

Your ZIP package with the source code and examples Preview 00:05

Theory: Assembly language crash course, Register types, Instruction syntax Preview 00:07

Theory: Assembly language crash course, Register types, Instruction syntax, Writing shellcode, Shellcode writing: the essentials, Glossary, Code injection, Notes about the 64-bit architecture

Basics of shellcode development - VIDEO TRAINING Preview 17:35

Theory: Intro, Writing rootkit code, Hiding processes Preview 00:03

Theory: Intro, Writing rootkit code, Hiding processes, Hiding files and registry entries, Notes on 64-bit architecture

Hiding processes - VIDEO TRAINING Preview 17:46

Theory: Hiding files Preview 00:01

Theory: Hiding files

Hiding files and directories - VIDEO TRAINING Preview 19:07

Theory: Intro, Notes about the 64-bit mode, Hiding registry entries Preview 00:03

Theory: Intro, Notes about the 64-bit mode, Hiding registry entries

Hiding registry entries - VIDEO TRAINING Preview 11:52

Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending Preview 00:04

Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun

Creating a keylogger - VIDEO TRAINING Preview 23:50

Theory: Remote console Preview 00:01

Theory: Remote console

Creating a remote console - VIDEO TRAINING Preview 12:26

Theory: What defense mechanisms are included in Windows? Preview 00:03

Theory: What defense mechanisms are included in Windows?

Windows security features - VIDEO TRAINING Preview 10:32

Theory: Understanding how antiviruses detect threats, Signatures Preview 00:02

Theory: Understanding how antiviruses detect threats, Signatures

Creating undetectable applications - VIDEO TRAINING Preview 12:50

Theory: Heuristics, Deceiving a heuristic scanner Preview 00:02

Theory: Heuristics, Deceiving a heuristic scanner

Deceiving a heuristic scanner - VIDEO TRAINING Preview 08:00

Theory: Emulation, RC4 overview, System calls and 64-bit architecture Preview 00:03

Theory: Emulation, RC4 overview, System calls and 64-bit architecture

Anti-emulation techniques - VIDEO TRAINING Preview 10:10

Theory: Bypassing a firewall, Modifying the remote console Preview 00:03

Theory: Bypassing a firewall, Modifying the remote console

Bypassing a firewall - VIDEO TRAINING Preview 14:09

Theory: Areas for hiding programs, Running a program as a system service, Dll sp Preview 00:04

Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing

Keeping a rootkit in a system - VIDEO TRAINING Preview 17:34

Theory: Rootkit detectors Preview 00:01

Theory: Rootkit detectors

Defense and rootkit detectors - VIDEO TRAINING Preview 19:04

Theory: Rootkit development and summary Preview 00:02

Video module transcript: Rootkit development and summary

Rootkit development and summary - VIDEO TRAINING Preview 16:02

Become CISS - Certified Hacking Training - Monitoring Transmitted 1 Preview 19:59

IT Security Beginner 2.0 - Certified Hacking Training - Monitoring Transmitted Data in Wireshark - Part 1

Become CISS - Certified Hacking Training - Monitoring Transmitted 2 Preview 19:57

IT Security Beginner 2.0 - Certified Hacking Training - Monitoring Transmitted Data in Wireshark - Part 2

Become CISS - Certified Hacking Training - WiFi Security - Part 1 Preview 14:21

IT Security Beginner 2.0 - Certified Hacking Training - WiFi Security - Part 1

Become CISS - Certified Hacking Training - WiFi Security - Part 2 Preview 13:15

IT Security Beginner 2.0 - Certified Hacking Training - WiFi Security - Part 2

Become CISS - Certified Hacking Training - WiFi Threats and Attacks Preview 18:35

IT Security Beginner 2.0 - Certified Hacking Training - WiFi Threats and Attacks

Website Hacking in Practice - SQL Injection Preview 18:39

Demo lecture on SQL Injection Attacks from "Website Hacking in Practice" course.

BONUS LECTURE: Learn more and get to know our other courses Preview 00:40

Thanks for joining Preview 00:06