Skip to content

Latest commit

 

History

History
66 lines (51 loc) · 2.08 KB

README.md

File metadata and controls

66 lines (51 loc) · 2.08 KB

RED TEAM Operator: Malware Development Essentials Course

Sektor7 Banner

Course Overview

I recently completed an essesntial Mal Dev course. This course covered a comprehensive range of topics designed to enhance skills in malware development, payload obfuscation, and evading antivirus solutions.

Course Topics

Intro and Setup

  • Introduction
  • Development VM Setup
    • RTO-Win10.ova
    • RTO-maldev.zip

Portable Executable

  • PE Files - Format and Structure
  • PE Bear - Looking Inside
  • Generating EXE vs DLL
  • PE Compilation

Droppers

  • Where to Store Payloads?
  • Storing Payloads in Code Section
  • Data Section as a Container
  • Payloads in Resource Section

Obfuscation and Hiding

  • Encoding and Encryption
    • Payload Encoding
    • Encrypting Payloads - XOR
    • Encrypting Payloads - AES
  • Antivirus vs Call Obfuscation
  • Implementing Function Call Obfuscation

Backdoors and Trojans

  • Backdooring PE Theory
  • Making Putty a Trojan

Code Injection

  • What is Code Injection?
  • Injecting Code into Remote Process
  • Implementing Code Injection
  • Loading DLLs into Remote Process
  • DLL Generator and Injector

Extras

  • Making Program Invisible
  • Combined Project

Dropper Overview

  • Dropper Implementation
  • Bypassing Windows Defender

Final Assignment

Assignment Overview

The final assignment involved turning a custom dropper into a stealthy version with the following enhancements:

  • Encrypt All Strings
  • Obfuscate All Function Calls
  • Change XOR to AES (I used XOR btw)

Real-life Application

  • Think about how you could hide your encrypted payload behind an image.
  • Build a dropper, which hosts its payload in a separate encrypted file (on disk or on a file share). Hint: Use CreateFile() and ReadFile(); example code.