![]() |
|
Malware Development for Ethical Hackers and Pentesters - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Malware Development for Ethical Hackers and Pentesters (/Thread-Malware-Development-for-Ethical-Hackers-and-Pentesters) |
Malware Development for Ethical Hackers and Pentesters - AD-TEAM - 05-28-2025 ![]() 11.39 GB | 41min 55s | mp4 | 1920X1080 | 16:9 Genre:eLearning |Language:English
Files Included :
1 - Introduction.mp4 (7.2 MB) 55 - What is lsass process in windows.mp4 (26.46 MB) 56 - How do we steal the password from lsass process in windows.mp4 (54.58 MB) 57 - Understanding Windows API functions used in finding the target process id.mp4 (75.62 MB) 58 - Understanding the program logic of process id lsassexe finding program.mp4 (135.63 MB) 59 - Practical demonstration of finding the process id of lsass in Windows.mp4 (38.26 MB) 60 - Understanding the program flow of password stealing program from lsass process.mp4 (73.61 MB) 61 - Practical demonstration of dumping the memory of lsass process from our malware.mp4 (105.3 MB) 62 - Extracting the password hashes from the lsass dump file.mp4 (67.52 MB) 2 - Lab setup 1.mp4 (12.19 MB) 10 - Understanding PE sections in windows.mp4 (160.92 MB) 11 - Understanding token handle and thread of a process.mp4 (71.96 MB) 12 - Understanding token information in process hacker.mp4 (295.09 MB) 13 - Understanding handle table information.mp4 (43.21 MB) 14 - Understanding threads in process hacker.mp4 (53.91 MB) 3 - What is a malware and its types.mp4 (12.16 MB) 4 - Introduction to PE file structure.mp4 (217.31 MB) 5 - Understanding MSDOS Header in PE file of windows.mp4 (532.63 MB) 6 - Understanding DOS stub in PE file of windows.mp4 (160.53 MB) 7 - PE Header section structure Basics.mp4 (187.54 MB) 8 - Understanding PE Headers subsections Signature File Header and OptionalHeader.mp4 (979.85 MB) 9 - Understanding PE Section Headers.mp4 (732.7 MB) 15 - What is a Handle in windows.mp4 (602.77 MB) 16 - Windows Handle example Finding out running program using windows handle.mp4 (103.35 MB) 17 - Windows Handle example Hiding minimizing maximizing running program.mp4 (108.54 MB) 18 - Lab configuration in Malware development machine.mp4 (242.5 MB) 19 - Deep diving into CreateProcess function and understanding its input parameters.mp4 (702.27 MB) 20 - Creating a process using CreateProcess function.mp4 (381.51 MB) 21 - How can we hide a program using STARTUPINFO structure flags.mp4 (93.68 MB) 22 - Hiding program practical demonstration.mp4 (154.82 MB) 23 - Hiding program using CreateProcess function flags in windows.mp4 (148.08 MB) 24 - Hiding console programs in windows.mp4 (91.02 MB) 25 - Understanding inherit handles in CreateProcess function in windows.mp4 (509.76 MB) 26 - Practical demonstration of inherit handle in CreateProcess function.mp4 (510.08 MB) 27 - How to set custom environment variable for child process in windows.mp4 (66.11 MB) 28 - How to set custom working directory for child process in CreateProcess function.mp4 (79.05 MB) 29 - How to open a process using OpenProcess windows api function.mp4 (26.42 MB) 30 - Understanding CreateThread function working in windows.mp4 (57.37 MB) 31 - Practical demonstration of thread creation with CreateThread windows function.mp4 (106.71 MB) 32 - How to execute a shellcode with CreateThread function.mp4 (112.23 MB) 33 - Practical demonstration of executing a shellcode with CreateThread function.mp4 (225.82 MB) 34 - Understanding ANSI and UNICODE in windows programming.mp4 (5.34 MB) 35 - Understanding how to inject code into other running processes in windows.mp4 (130.57 MB) 36 - Practical demonstration of malware code injection into other processes in window.mp4 (74.53 MB) 37 - Understanding DLL injection attack in windows.mp4 (173.17 MB) 38 - Practical demonstration of DLL injection attack in windows.mp4 (58.08 MB) 39 - Understanding DLL hijacking concept in windows.mp4 (47.7 MB) 40 - dll-hijacking.zip (130.17 KB) 40 - Practical demonstration of DLL hijacking in windows.mp4 (99.47 MB) 41 - Understanding APC code injection technique.mp4 (249.87 MB) 42 - APC injection practical demonstration in windows.mp4 (168.14 MB) 43 - Malware persistence using registry entry.mp4 (138.45 MB) 44 - Practical demonstration of Malware persistence using registry entry.mp4 (263.52 MB) 45 - Malware persistence via Winlogon.mp4 (43.55 MB) 46 - Practical demonstration of malware persistence via Winlogon.mp4 (279.31 MB) 47 - Understanding malware persistence by creating Malicious Windows Services.mp4 (157.69 MB) 48 - Practical demonstration of malware persistence via creating Windows Service.mp4 (639.93 MB) 49 - Understanding basic token theft concept.mp4 (79.99 MB) 50 - How to enable SeDebugPrivilege understanding basic concept.mp4 (50.06 MB) 51 - Understanding the working of enable SeDebugPrivilege program.mp4 (242.05 MB) 52 - Practical demonstration of enabling SeDebugPrivilege of a program token.mp4 (90.78 MB) 53 - Understanding the basic steps of how to steal token of winlogon process.mp4 (16.83 MB) 54 - Practical demonstration of stealing token of winlogon process.mp4 (284.93 MB)] Screenshot ![]()
RapidGator
NitroFlare |