Specialized Malware: Code Injection .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 45m | 109 MB
Instructor: John Tear
Designed for aspiring malware analysts and exploit developers, this course caters to individuals interested in the exploitation of the Win32 APIs to inject shellcode into remote processes.
What you'll learn Understanding code injection in Windows and analyzing indicators of compromise (IOCs) is crucial for cybersecurity professionals aiming to defend against sophisticated attacks. In this course, Specialized Malware: Code Injection, you'll learn to understand how hackers develop code injection exploits by using the Win32 APIs to inject code into the virtual memory of a remote process and trigger thread creation to run the code. You will be introduced to the tools you can use to extract IOCs from memory for analysis.
First, you'll explore the anatomy of code injection in the Windows operating system, gaining a comprehensive understanding of how these exploits operate at a fundamental level. Next, you'll discover DLL Injection, including reflective injection, and learn how attackers use these methods to inject malicious code stealthily. Finally, you'll learn advanced code injection techniques such as process hollowing, which allows malware to masquerade as legitimate processes.
When you're finished with this course, you'll have the skills and knowledge of code injection needed to understand, develop, and analyze sophisticated code injection exploits, as well as extract valuable IOCs from memory for in-depth analysis.
More InfoFileAxaWarning! You are not allowed to view this text.
RapidGatorWarning! You are not allowed to view this text.
FileStoreTurboBitWarning! You are not allowed to view this text.