MP4 | h264, 1280x720 | Lang: English | Audio: aac, 4410 Hz | 3h 13m | 1.45 GB
You will learn to create virtual machines.
What you'll learn
You will learn C#/.NET basics.
You will learn to set-up Apache, MySQL services.
You will learn PHP, MySQL basics.
You will learn how malwares work.
You will learn how to create your custom malware from scratch.
You will learn how to communicate with your Attacker server.
You will learn how to send commands from Attacker to victims.
You will learn how to control multiple computers from one control panel.
You will learn how to enumerate and exfiltrate information from Windows systems.
You will learn how to additional files to victims computer.
You will learn how to gain persistence on system.
You will learn how to execute commands via CMD.
Basic TCP/IP knowledge.
Basic programming knowledge.
Basic GNU/Linux knowledge.
Basic object orianted programming language knowledge will be a plus.
Are you interested in cybersecurity and/or developing your offensive tools in ethical hacking purposes ?
In this course, we will dive deep into the malwares and control panels by creating an actual one. You will learn how to develop your own custom malware from scratch with step-by-step detailed instructions for bners. You will also learn how to enhance your malware's capabilities by developing special methods such as gathering host information, gaining persistance, uploading files to victim computer and executing commands via Command Line. After developing your own malware, you will then develop a custom attacker server software to control multiple victims at the same from a web panel like professional C2 servers using PHP and MySQL.
This course will provide you with everything you need to know in terms of malware and command-control server in bner level. After this course you will feel more confident in your skills as a penetration tester, ethical hacker and red teamer. You will also have a fundamental understanding of offensive tools. If you are a blue teamer, threat hunter or incident responder, you can also benefit from this course by knowing how threat actors and APT's develope their malwares and command control structures.
All of the captions are reviewed so feel free to use it for better learning experience.
Who this course is for:
Anyone interested in developing custom malwares.
System / Network Admins
Blue Teams / Threat Hunters
Cyber security enthusiasts