Rootkits and Stealth Software: Creating and Revealing 2.0

Rootkits and Invisible Software – creating and revealing

1696 STUDENTS ENROLLED
  • Profile photo of earl
  • Profile photo of henrik
  • Profile photo of JUNIOR
  • Profile photo of Maninder Singh

Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we’d like to share with you.

rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. – definition by Wikipedia

  • You can ignore the fact that rootkits really exist,
  • You can pretend that goverment agencies don’t use rootkits,
  • You can even believe that big companies don’t spend huge amount of money for developing malicious software that can spy on you and your family,
  • You can just turn a blind eye on it and ignore these fact.

But it does not make the problem disappear.

Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.

This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

What you can expect from this course:

  • You’ll learn how to create shellcode
  • You’ll learn how to inject code into processes
  • You’ll learn how to hide processes, files, directories and registry entries
  • You’ll learn how to keep a rootkit in a system
  • You’ll learn how to create a backdoor
  • You’ll learn how to create an invisible keylogger and remote console
  • You’ll learn how to make a screenshot
  • You’ll learn how to create undetectable applications
  • You’ll learn how to deceive Anti-Virus applications
  • You’ll learn how to use anti-emulation techniques
  • You’ll learn how to bypass a firewall
  • You’ll learn how to create a rootkit detector
  • You’ll learn how to protect against rootkits
  • And many other interesting topics

We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if the Wireless Network Hacking Course is for you. You will get access to the whole system. If for any reason you’re not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || Hacking School Team

What are the requirements?

  • interest in ITsec and ethical hacking
  • some IT and programming basics (C/C++)

What am I going to get from this course?

  • Over 43 lectures and 10 hours of content!
  • Lectures in PDF + Live Video Training
  • Free source code package to download
  • How to create shellcode
  • How to inject code
  • How to hide processes, files, directories and registry entries
  • How to keep a rootkit in a system
  • How to create a backdoor
  • How to create an invisible keylogger and remote console
  • How to make a screenshot
  • Creating undetectable applications
  • How to deceive Anti-Virus applications
  • How to use anti-emulation techniques
  • How to bypass a firewall
  • How to create a rootkit detector
  • How to protect against rootkits

What is the target audience?

  • students interested in rootkit development
  • ethical hackers
  • system and network administrators
  • everyone interested in hacking in general
  • CEH, CISSP, MCSE, CCNA

Course Curriculum

Table of contents
Table of contents – Rootkits and Invisible Software FREE 00:06:00
Legal information
Legal information and A/V info 00:14:00
Module 1. Introduction and environment setup
Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits, What you need to know to start, Compatibility and current code version, Further reading FREE 00:06:00
Practice: Environment setup (training video) 00:26:12
Video module transcript: Environment setup 00:22:00
Module 2. Basics of shellcode development
Theory: Assembly language crash course, Register types, Instruction syntax, Writing shellcode, Shellcode writing: the essentials, Glossary, Code injection, Notes about the 64-bit architecture 00:12:00
Practice: Writing a shellcode (training video) 00:17:35
Video module transcript: Writing a shellcode 00:14:00
Module 3.1. Hiding processes
Theory: Intro, Writing rootkit code, Hiding processes 00:34:00
Practice: Hiding processes (training video) 00:17:46
Video module transcript: Hiding processes 00:20:00
Module 3.2. Hiding files and directories
Theory: Hiding files and directories 00:12:00
Practice: Hiding files (training video) 00:19:07
Video module transcript: Hiding files 00:22:00
Module 3.3. Hiding registry entries
Theory: Intro, Notes about the 64-bit mode 00:10:00
Practice: Hiding registry entries (training video) 00:11:52
Video module transcript: Hiding registry entries 00:12:00
Module 4.1. Creating a backdoor, implementation of a keylogger
Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending logs, Autorun 00:30:00
Practice: Creating a keylogger (training video) 00:23:50
Video module transcript: Creating a keylogger 00:24:00
Module 4.2. Remote console
Theory: Remote console 00:12:00
Practice: Remote console (training video) FREE 00:12:26
Video module transcript: Remote console 00:18:00
Module 5. Windows security features
Theory: What defense mechanisms are included in Windows? 00:06:00
Practice: Windows security features (training video) 00:10:32
Video module transcript: Windows security features 00:12:00
Module 6.1. Creating undetectable applications
Theory: Understanding how antiviruses detect threats, Signatures 00:04:00
Practice: Creating undetectable applications (training video) 00:12:50
Video module transcript: Creating undetectable applications 00:10:00
Module 6.2. Deceiving a heuristic scanner
Theory: Heuristics, Deceiving a heuristic scanner 00:02:00
Practice: Deceiving a heuristic scanner (training video) 00:08:00
Video module transcript: Deceiving a heuristic scanner 00:10:00
Module 6.3. Anti-emulation techniques
Theory: Emulation, RC4 overview, System calls and 64-bit architecture 00:12:00
Practice: Anti-emulation techniques (training video) 00:10:10
Video module transcript: Anti-emulation techniques 00:12:00
Module 7. Bypassing the firewall
Theory: Bypassing a firewall, Modifying the remote console 00:16:00
Practice: Bypassing a firewall (training video) 00:14:09
Video module transcript: Bypassing a firewall 00:14:00
Module 8. Keeping a rootkit in a system
Theory: Areas for hiding programs, Running a program as a system service, Dll spoofing 00:18:00
Practice: Keeping a rootkit in a system (training video) 00:17:34
Video module transcript: Keeping a rootkit in a system 00:20:00
Module 9. Defense
Theory: Rootkit detectors 00:16:00
Practice: Defense (training video) 00:19:04
Video module transcript: Defense 00:22:00
Module 10. Rootkit development and summary
Practice: Rootkit development and summary (training video) 00:16:02
Video module transcript: Rootkit development and summary 00:22:00

Course Reviews

N.A

ratings
  • 1 stars0
  • 2 stars0
  • 3 stars0
  • 4 stars0
  • 5 stars0

No Reviews found for this course.

TAKE THIS COURSE
  • $199.00 $97.00
  • UNLIMITED ACCESS
  • Course Badge
  • Course Certificate
  • 46 Lectures
  • 11 hours, 41 minutes
  • Basic Programming skills required
  • VIDEOS + PDFS
  • MONEY BACK GUARANTEE
© IT Security Academy