This Course using RedTeam gives you more knowledge on how easy it is to bypass or evade antivirus by your target in your company. RedTeam must go well and fight with BlueTeam by using this way, and the Lecture has experienced with RedTeam how professional attackers attack targets in different ways, including understanding the process of how malware works.
List of Lessons video MP4 :
001. VM setup
01. Intro
02. PE format
03. PE bear
04. generateEXEvsDLL
05. generatePE
06. payload storage
07. payload stor text
08. payload stor data
09. payload stor rsrc
10. payload EE
11. payload encoding B64
12. payload encrypt XOR
13. payload encrypt AES
14. function call obfusc
15. function call obfusc Example
16. backdooring PE Freeeducationweb. com
17. backdooring PE Example
18. code_inject payload
18a. code_inject why
19. code_inject payload Example
20. code_inject DLL
21. code_inject DLL Example
22. hiding console
23. combination
24. combination Example
25. combination WD bypass
26. Summary Ending
List of Lessons video MP4 :
001. VM setup
01. Intro
02. PE format
03. PE bear
04. generateEXEvsDLL
05. generatePE
06. payload storage
07. payload stor text
08. payload stor data
09. payload stor rsrc
10. payload EE
11. payload encoding B64
12. payload encrypt XOR
13. payload encrypt AES
14. function call obfusc
15. function call obfusc Example
16. backdooring PE Freeeducationweb. com
17. backdooring PE Example
18. code_inject payload
18a. code_inject why
19. code_inject payload Example
20. code_inject DLL
21. code_inject DLL Example
22. hiding console
23. combination
24. combination Example
25. combination WD bypass
26. Summary Ending
drcrypter.ru