ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Malware Development: System Calls

crow

hacking

maldev

winapi

c++

programming

malware development

malware

virus

tutorial

how to

pentesting

penetration testing

kali

windows

win32 api

security

hack

hacked

developing malware

making malware

making viruses

pentester

red teaming

red team

offsec

oscp

certification

research

developing

hacker

active directory

blue team

ad hacking

ad

binexp

binary exploitation

compsci

computer science

computer

pc

linux

os

operating system

2023

minecraft

fun

live

memes

trending

Автор: crow

Загружено: 2024-02-06

Просмотров: 53547

Описание: #Malware #Development

🦠 Use code "CROW10" for 10% OFF your order when you checkout at Maldev Academy! https://maldevacademy.com/?ref=crow

I sincerely hope you enjoyed watching this installment of our ongoing malware development series. I know the kernel debugging portion was a bit rushed, and for that, I apologize. I had an entire segment dedicated to kernel debugging, the intricacies of MSRs as well as the incredible CPUID instruction, and all of that planned out for this video but as you could imagine, had I included that, the video would be a month-long. So instead, I'm working on a blog post that will take you into harrowing depths of that entire process, so make sure you look out for it here: https://www.crow.rip/

Either way, thank you so much for watching, nerds! :D

🌐 Websites/Things Mentioned + Extra Reading:
Once I finish my blog, I'll include a link to the references section which will have all of these links and a LOT more.

Intel® 64 and IA-32 Architectures Software Developer Manuals: https://www.intel.com/content/www/us/...
A Syscall Journey in the Windows Kernel: https://alice.climent-pommeret.red/po...
The Quest for the SSDTs: https://www.codeproject.com/Articles/...
System Service Descriptor Table - SSDT: https://www.ired.team/miscellaneous-r...
OS2's Free Internals Course: https://p.ost2.fyi/courses/course-v1:...
HellsGate: https://github.com/am0nsec/HellsGate/...
Direct Syscalls vs Indirect Syscalls: https://redops.at/en/blog/direct-sysc...
ByePg: Defeating Patchguard using Exception-hooking: https://blog.can.ac/2019/10/19/byepg-...
Infinity Hook: https://github.com/everdox/InfinityHook
GhostHook – Bypassing PatchGuard with Processor Trace Based Hooking: https://www.cyberark.com/resources/th...

⚠️ Disclaimer:
The information presented in this video is for educational purposes only. It is not intended to be used for illegal or malicious activities. The creator and any individuals involved in the production of this video are not responsible for any misuse of the information provided. It is the responsibility of the viewer to ensure that they comply with all relevant laws and regulations in their jurisdiction.

💖 Support My Work
  / cr0w  
https://ko-fi.com/cr0ww
https://www.buymeacoffee.com/cr0w
Join this channel to get access to perks:
   / @crr0ww  

🔖 My Socials
  / discord  
https://www.crow.rip/
https://github.com/cr-0w
  / cr0ww_  

The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.

Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.

🕰️ Timestamps:
00:00 - Intro
02:38 - Learn Malware Development
04:26 - Today's Agenda
05:07 - Recap
07:48 - Post Syscall Invocation
16:20 - Direct Syscalls
20:05 - API Hooking Demo
25:36 - Back to Direct Syscalls
37:53 - Indirect Syscalls
44:28 - Outro

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Malware Development: System Calls

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Malware's LAST Stand: SELF-DELETION

Malware's LAST Stand: SELF-DELETION

Malware Development: Processes, Threads, and Handles

Malware Development: Processes, Threads, and Handles

Buffer Overflows: A Symphony of Exploitation

Buffer Overflows: A Symphony of Exploitation

How a Single Bit Inside Your Processor Shields Your Operating System's Integrity

How a Single Bit Inside Your Processor Shields Your Operating System's Integrity

Malware Development #-1 Process & Thread | Complete Course

Malware Development #-1 Process & Thread | Complete Course

An Introduction to Malware Analysis

An Introduction to Malware Analysis

Malware Development: Native API

Malware Development: Native API

УАЗ ПАТРИОТ - Качественный провал?

УАЗ ПАТРИОТ - Качественный провал?

Похудей на 45 КГ, Выиграй $250,000!

Похудей на 45 КГ, Выиграй $250,000!

ВСЯ ПРАВДА О ЛИШЕНИИ ЛИЦЕНЗИИ, ФЕДЕРАЦИИ БОКСА И OLI***BET

ВСЯ ПРАВДА О ЛИШЕНИИ ЛИЦЕНЗИИ, ФЕДЕРАЦИИ БОКСА И OLI***BET

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]