09-22-2023, 10:57 PM
Practical Linux Malware Development
Published 9/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 548.75 MB | Duration: 1h 24m
Develop your own undetectable Linux malware using the Go programming language
What you'll learn
Develop undetectable Linux malware
Develop software using the Go programming language
Understand the internals of modern Linux malware
Understand network programming using Go and Python
Requirements
Basic to intermediate programming experience in any programming language
An understanding of how to use the Linux terminal
Description
Over the past couple years, Linux malware has been on the rise . This has created a greater interest in studying and analyzing such threats against Linux platforms . This course aims to equip you with the knowledge to not only emulate such threats, but also be in a better position to detect and mitigate them from your Linux environments .This course will take you through developing your very own Linux malware with capabilities like executing shell commands, file transfer and taking screenshots . You will also learn how to achieve persistence in Linux . Finally, we will create our own custom server using the Python programming language . The server is what we will be using to interact with the malware on the target system .That makes the course therefore relevant to both red teamers and blue teamers . System administrators will also benefit from the course . Red teamers will be better equipped to emulate such threats against Linux environments, while blue teamers and system administrators alike will be in a better position to detect and properly respond to such threats .Also, if you are a software engineer interested in more hands-on learning about the programming language, this course will definitely help you with that . Python is also used, and this makes the course also suit python programming enthusiasts .
Overview
Section 1: Introduction
Lecture 1 Welcome to the course
Lecture 2 Demo of the finished project
Section 2: Getting Started
Lecture 3 Environment Setup
Section 3: Developing the RAT
Lecture 4 Project Setup
Lecture 5 Connecting to C2 Server
Lecture 6 Receiving Incoming Commands
Lecture 7 Sending back Response
Lecture 8 Closing/Terminating the Connection
Lecture 9 Changing Directories
Lecture 10 FIle Transfer
Lecture 11 Uploading file to Machine
Lecture 12 Downloading file from Machine
Lecture 13 Minor bug fixes
Lecture 14 Taking a Screenshot
Lecture 15 Achieving Persistence
Lecture 16 Executing Shell Commands
Lecture 17 Testing with Netcat
Section 4: Developing the Server
Lecture 18 Project Setup
Lecture 19 Creating a Listener
Lecture 20 Accepting Incoming Connections
Lecture 21 Loop to take in Attacker's Commands
Lecture 22 Handling the q/quit Command
Lecture 23 Receiving and Saving Screenshot
Lecture 24 File Download
Lecture 25 File Upload
Lecture 26 Shell Commands
Lecture 27 Testing with our RAT
Section 5: Conclusion
Lecture 28 Next Steps
Anyone interested in understanding how to develop malware using Go,Red Teamers interested in using Go to create their malware,Blue Teamers interested in understanding the internals of malware threats against Linux environments,Go and Python developers interested in an exciting project
Practical Linux Malware Development (548.8 MB)
KatFile Link(s)
RapidGator Link(s)