#Malware Development Fundamentals With C
- مقدماتی
- مسیر قرمز
- ۹ درس
نام دوره: #Malware Development Fundamentals With C
دربارهی این دوره
این دوره به چه افرادی توصیه میشود؟
- کارشناسان عملیات تیم قرمز
- کارشناسان تیم آبی
- مدیران امنیت
- علاقهمندان به امنیت سایبری
برای حضور در این دوره چه دانشهایی باید داشته باشم؟
- تسلط بر یک زبان برنامه نویسی
- آشنایی با پایگاه داده
- آشنایی با اصول و مبانی شبکه
- آشنایی با امنیت سایبری
سرفصلهای دوره
-
Introduction
-
Get familiar with most famous red team tool: C&C
-
-
C&C Infrastructure
-
Getting familiar with C&C modules
-
-
Common C&C types
-
Review reverse and bind Malwares
-
Lear most common Communication types: http, https
-
File types: Modules, Executables, MalDocs, …
-
-
Short review of Cobalt Strike: A top down approach
-
Extract C&C functional tasks
-
What a good C&C should do
-
Major elements for panel
-
Analyze C&C behavior in network layer
-
-
Develop Your First Bind C&C: Target Side
-
Implement five major tasks of your C&C RAT
-
Prevent any unwanted crashes
-
Follow the loop with managed scheduling
-
-
Develop Your First Bind C&C: Server Side
-
Design a simple control panel
-
Setup a listener
-
Process agent requests
-
Send commands and receive corresponding results
-
Design data management strategy
-
Managing multiple agents simultaneously
-
Some advises for subsiding the risks
-
-
Persistence (Remain on Your Target)
-
Common usable directories
-
Registry keys
-
Startup folder
-
Tasks scheduler
-
-
Some Tricks to Remain Undetected
-
AV and EDR detection bypass essentials
-
Payload unique encoding
-
Make as least as possible noise to remain FUD
-
Distributing tasks
-
Network detection evading tricks
-
-
One Malware, Multiple Forms
-
Bind your payload with other files
-
Shell injection
-
Packing, Installer
-
MalDocs
-
گواهینامهی دوره
