Rootkit And Stealth Software Development
Tags: Network Security
Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101
Last updated 2022-01-10 | 4.5
- Over 30 lectures and 10 hours of content!- Lectures in PDF + Live Video Training
- Free source code package to download
What you'll learn
* Requirements
* interest in ITsec and ethical hacking* some IT and programming basics (C/C++)
Description
- Over 30 lectures and 10 hours of content!
- Lectures in PDF + Live Video Training
- Free source code package to download
- How to create shellcode
- How to inject code
- How to hide processes, files, directories and registry entries
- How to keep a rootkit in a system
- How to create a backdoor
- How to create an invisible keylogger and remote console
- How to make a screenshot
- Creating undetectable applications
- How to deceive Anti-Virus applications
- How to use anti-emulation techniques
- How to bypass a firewall
- How to create a rootkit detector
- How to protect against rootkits
Course content
12 sections • 40 lectures
Welcome to the course Preview 00:05
Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits Preview 00:07
Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits, What you need to know to start, Compatibility and current code version, Further reading
Introduction and setup - VIDEO TRAINING Preview 26:12
Your ZIP package with the source code and examples Preview 00:05
Theory: Assembly language crash course, Register types, Instruction syntax Preview 00:07
Theory: Assembly language crash course, Register types, Instruction syntax, Writing shellcode, Shellcode writing: the essentials, Glossary, Code injection, Notes about the 64-bit architecture
Basics of shellcode development - VIDEO TRAINING Preview 17:35
Theory: Intro, Writing rootkit code, Hiding processes Preview 00:03
Theory: Intro, Writing rootkit code, Hiding processes, Hiding files and registry entries, Notes on 64-bit architecture
Hiding processes - VIDEO TRAINING Preview 17:46
Theory: Hiding files Preview 00:01
Theory: Hiding files
Hiding files and directories - VIDEO TRAINING Preview 19:07
Theory: Intro, Notes about the 64-bit mode, Hiding registry entries Preview 00:03
Theory: Intro, Notes about the 64-bit mode, Hiding registry entries
Hiding registry entries - VIDEO TRAINING Preview 11:52
Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending Preview 00:04
Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun
Creating a keylogger - VIDEO TRAINING Preview 23:50
Theory: Remote console Preview 00:01
Theory: Remote console
Creating a remote console - VIDEO TRAINING Preview 12:26
Theory: What defense mechanisms are included in Windows? Preview 00:03
Theory: What defense mechanisms are included in Windows?
Windows security features - VIDEO TRAINING Preview 10:32
Theory: Understanding how antiviruses detect threats, Signatures Preview 00:02
Theory: Understanding how antiviruses detect threats, Signatures
Creating undetectable applications - VIDEO TRAINING Preview 12:50
Theory: Heuristics, Deceiving a heuristic scanner Preview 00:02
Theory: Heuristics, Deceiving a heuristic scanner
Deceiving a heuristic scanner - VIDEO TRAINING Preview 08:00
Theory: Emulation, RC4 overview, System calls and 64-bit architecture Preview 00:03
Theory: Emulation, RC4 overview, System calls and 64-bit architecture
Anti-emulation techniques - VIDEO TRAINING Preview 10:10
Theory: Bypassing a firewall, Modifying the remote console Preview 00:03
Theory: Bypassing a firewall, Modifying the remote console
Bypassing a firewall - VIDEO TRAINING Preview 14:09
Theory: Areas for hiding programs, Running a program as a system service, Dll sp Preview 00:04
Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing
Keeping a rootkit in a system - VIDEO TRAINING Preview 17:34
Theory: Rootkit detectors Preview 00:01
Theory: Rootkit detectors
Defense and rootkit detectors - VIDEO TRAINING Preview 19:04
Theory: Rootkit development and summary Preview 00:02
Video module transcript: Rootkit development and summary
Rootkit development and summary - VIDEO TRAINING Preview 16:02
Become CISS - Certified Hacking Training - Monitoring Transmitted 1 Preview 19:59
IT Security Beginner 2.0 - Certified Hacking Training - Monitoring Transmitted Data in Wireshark - Part 1
Become CISS - Certified Hacking Training - Monitoring Transmitted 2 Preview 19:57
IT Security Beginner 2.0 - Certified Hacking Training - Monitoring Transmitted Data in Wireshark - Part 2
Become CISS - Certified Hacking Training - WiFi Security - Part 1 Preview 14:21
IT Security Beginner 2.0 - Certified Hacking Training - WiFi Security - Part 1
Become CISS - Certified Hacking Training - WiFi Security - Part 2 Preview 13:15
IT Security Beginner 2.0 - Certified Hacking Training - WiFi Security - Part 2
Become CISS - Certified Hacking Training - WiFi Threats and Attacks Preview 18:35
IT Security Beginner 2.0 - Certified Hacking Training - WiFi Threats and Attacks
Website Hacking in Practice - SQL Injection Preview 18:39
Demo lecture on SQL Injection Attacks from "Website Hacking in Practice" course.