Atur jumlah dan catatan
Stok Total: Sisa 10
Subtotal
Rp900.000
Dark Vortex - Malware On Steroids
Rp900.000
- Kondisi: Baru
- Min. Pemesanan: 1 Buah
- Etalase: Dark Vortex
The Malware On Steroids is the first course which is dedicated to building your own C2 Infrastructure and Payload. There are a lot of courses which focus on exploitation, reversing and other offensive stuff, but none of them focus on how you can build your own Command & Control Infra. This course focuses on a brief introduction towards Windows Internals followed by a full hands-on course on building a Command & Control architecture with different types of Initial Access payloads.
During the course, you will learn the core fundamentals of a Malware Lifecycle such as initial access, in-memory evasions, different types of payload injections including but not limited to reflective DLLs, shellcode injection, COFF injections and more. You will learn to build different types of remote access tools running over different protocols which we will later convert to in-memory modules that can be injected to any process. We will also write dropper and stagers in x64 Assembly, C and different LOLbins which will connect back to our CnC to extract the second stage and load it into memory for execution.
Dark Vortex - Malware On Steroids
Size: 2.30 GB
Contains: 9 Files, 0 Folders
Prerequisites.
The course is highly practical in nature and involves a lot of programming in C/C++ and Python3, reverse engineering in windbg/x64dbg. Its important to have a good grasp of the below fundamentals before approaching the course.
- Basic Understanding of operating system architecture
- Fundamental knowledge of programming with C/C++/Python3
- Familiarity with programming concepts (pointers, referenceses, addresses, data structures, threads, processes)
- Strong will to learn and creative mindset.
System Requirements.
During the course, we will be working with different virtual machines which will involve cloning, creating, and snapshots and several other hands-on exercises. A properly configured system is extremely important to fully utilize the benefits of the training session. We strongly request you to have fully configured system which meets the below requirements for the course. All the requirements mentioned below are either freely available or open source.
1. Windows 10 (Virtual Machine)
- A laptop with atleast 16GB RAM to support 2 VMs running at the same time.
- VMware/VirtualBox installed
- Good Internet Connectivity
- Visual Studio with C/C++/C# packages installed
- Visual Code/Editor of your choice
- x64dbg
- CFF Explorer
- Sysinternals Tookit
- Process Hacker
- MS Office (Trial version is enough)
2. Kali Linux/Ubuntu 20.04 (Virtual Machine)
- VS Code
- Mingw-w64
- Python3
- Nasm
- Wireshark
NOTE: Make sure you have a snapshot of each virtual machine before you start the class, just in case you have to revert everything back to stock if your Virtual Machine crashes during the training.
FOR EDUCATION PURPOSE ONLY!
During the course, you will learn the core fundamentals of a Malware Lifecycle such as initial access, in-memory evasions, different types of payload injections including but not limited to reflective DLLs, shellcode injection, COFF injections and more. You will learn to build different types of remote access tools running over different protocols which we will later convert to in-memory modules that can be injected to any process. We will also write dropper and stagers in x64 Assembly, C and different LOLbins which will connect back to our CnC to extract the second stage and load it into memory for execution.
Dark Vortex - Malware On Steroids
Size: 2.30 GB
Contains: 9 Files, 0 Folders
Prerequisites.
The course is highly practical in nature and involves a lot of programming in C/C++ and Python3, reverse engineering in windbg/x64dbg. Its important to have a good grasp of the below fundamentals before approaching the course.
- Basic Understanding of operating system architecture
- Fundamental knowledge of programming with C/C++/Python3
- Familiarity with programming concepts (pointers, referenceses, addresses, data structures, threads, processes)
- Strong will to learn and creative mindset.
System Requirements.
During the course, we will be working with different virtual machines which will involve cloning, creating, and snapshots and several other hands-on exercises. A properly configured system is extremely important to fully utilize the benefits of the training session. We strongly request you to have fully configured system which meets the below requirements for the course. All the requirements mentioned below are either freely available or open source.
1. Windows 10 (Virtual Machine)
- A laptop with atleast 16GB RAM to support 2 VMs running at the same time.
- VMware/VirtualBox installed
- Good Internet Connectivity
- Visual Studio with C/C++/C# packages installed
- Visual Code/Editor of your choice
- x64dbg
- CFF Explorer
- Sysinternals Tookit
- Process Hacker
- MS Office (Trial version is enough)
2. Kali Linux/Ubuntu 20.04 (Virtual Machine)
- VS Code
- Mingw-w64
- Python3
- Nasm
- Wireshark
NOTE: Make sure you have a snapshot of each virtual machine before you start the class, just in case you have to revert everything back to stock if your Virtual Machine crashes during the training.
FOR EDUCATION PURPOSE ONLY!
Ada masalah dengan produk ini?
ULASAN PEMBELI

Belum ada ulasan untuk produk ini
Beli produk ini dan jadilah yang pertama memberikan ulasan