Course content
7 sections • 23 lectures • 2h 53m total length
Section 1: Introduction & Welcome To Hacking With C!
1. Ethical Hacking Advanced - Learn How To build Undetectable Malware Using C
2. What Are We Going To Learn In This Course & What You Need To Know!
3. Our Malware In Action & Hacking Fully Secured And Updated Windows 10 Machine
4. How To Make An .EXE Transform Into Any Other File Type (.jpg, .pdf, .mp4 ... )
Section 2: Hiding Our Program & Defining Connection Points
5. Explaining Malware Structure & Including Needed Libraries
6. Hiding Our Program Console Window
7. Defining Connection Points To Our Backdoor 8. Note for next lecture ("goto instruction" in C programming)
9. Attempting Connection Every
10 Seconds With Our Target
Section 3: Building Shell Function & Executing Commands
10. Creating Our Shell Function
11. Executing Commands On Target Machine
12. Server Socket Initiation 13. Making Server Compatible With Our Backdoor
14. Testing Our Malware For Command Execution
Section 4: Switching Directories Inside Of A Program
15. Changing Our Program Directory
Section 5: Creating Persistence & Nesting Our Program In Windows Registry
16. Taking A Look At Windows Registry
17. Interacting With Registry In Order To Start Our Program Automatically
Section 6: Adding Keylogger To Our Malware
18. Understanding Keylogger Code
19. Adding Keylogger Function To Our Backdoor
Section 7: Hacking Windows 10
20. Updating Our Server Code
21. Hacking Windows 10 Target With Our Program
22. "You Have Been Hacked"
23. Is It a Browser Or Backdoor ?
Free Video Download Link: https://mega.nz/file/fwd0kBTS#DazdUDoBlOvAsL5U9abXJq72EGnVuTuMt6y5MedQe_s
Pass: Downloadforfree
Original Link: https://www.udemy.com/course/build-undetectable-malware-using-c-language-ethical-hacking/
Последнее редактирование: