Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 5.5 Hours | 960 MB

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

A rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. – definition by Wikipedia

  • You can ignore the fact that rootkits really exist,
  • You can pretend that goverment agencies don’t use rootkits,
  • You can even believe that big companies don’t spend huge amount of money for developing malicious software that can spy on you and your family,
  • You can just turn a blind eye on it and ignore these fact.

But it does not make the problem disappear.

Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.

This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

  • What you can expect from this course:
  • You’ll learn how to create shellcode
  • You’ll learn how to inject code into processes
  • You’ll learn how to hide processes, files, directories and registry entries
  • You’ll learn how to keep a rootkit in a system
  • You’ll learn how to create a backdoor
  • You’ll learn how to create an invisible keylogger and remote console
  • You’ll learn how to make a screenshot
  • You’ll learn how to create undetectable applications
  • You’ll learn how to deceive Anti-Virus applications
  • You’ll learn how to use anti-emulation techniques
  • You’ll learn how to bypass a firewall
  • You’ll learn how to create a rootkit detector
  • You’ll learn how to protect against rootkits
  • And many other interesting topics
Table of Contents

Introduction
1 Theory Foreword, What is a rootkit, Rootkit structure, Examples of rootkits
2 Introduction and setup – VIDEO TRAINING

Download your training source code and examples
3 Your ZIP package with the source code and examples

Basics of shellcode
4 Theory Assembly language crash course, Register types, Instruction syntax
5 Basics of shellcode development – VIDEO TRAINING

Hiding processes, files and registry entries
6 Theory Intro, Writing rootkit code, Hiding processes
7 Hiding processes – VIDEO TRAINING
8 Theory Hiding files
9 Hiding files and directories – VIDEO TRAINING
10 Theory Intro, Notes about the 64-bit mode, Hiding registry entries
11 Hiding registry entries – VIDEO TRAINING

Creating a backdoor and a keylogger
12 Theory Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending
13 Creating a keylogger – VIDEO TRAINING
14 Theory Remote console
15 Creating a remote console – VIDEO TRAINING

Windows security features
16 Theory What defense mechanisms are included in Windows
17 Windows security features – VIDEO TRAINING

Creating undetectable applications
18 Theory Understanding how antiviruses detect threats, Signatures
19 Creating undetectable applications – VIDEO TRAINING
20 Theory Heuristics, Deceiving a heuristic scanner
21 Deceiving a heuristic scanner – VIDEO TRAINING
22 Theory Emulation, RC4 overview, System calls and 64-bit architecture
23 Anti-emulation techniques – VIDEO TRAINING

Bypassing a firewall
24 Theory Bypassing a firewall, Modifying the remote console
25 Bypassing a firewall – VIDEO TRAINING

Keeping a rootkit in a system
26 Theory Areas for hiding programs, Running a program as a system service, Dll sp
27 Keeping a rootkit in a system – VIDEO TRAINING

Defense and rootkit detectors
28 Theory Rootkit detectors
29 Defense and rootkit detectors – VIDEO TRAINING

Rootkit development and summary
30 Theory Rootkit development and summary
31 Rootkit development and summary – VIDEO TRAINING

BONUS section
32 Become CISS – Certified Hacking Training – Monitoring Transmitted 1
33 Become CISS – Certified Hacking Training – Monitoring Transmitted 2
34 Become CISS – Certified Hacking Training – WiFi Security – Part 1
35 Become CISS – Certified Hacking Training – WiFi Security – Part 2
36 Become CISS – Certified Hacking Training – WiFi Threats and Attacks
37 Website Hacking in Practice – SQL Injection
38 BONUS LECTURE Learn more and get to know our other courses
39 Thank you for joining this training