Practical Linux Malware Development.
Are you ready to delve into the world of cybersecurity through the lens of Linux Malware Development? Our course offers a comprehensive learning experience that equips you with the skills and expertise needed to navigate the intricate world of malware creation. Join us and unlock your potential in this cutting-edge field today.
Nemuel Wainaina
Nemuel is a security researcher with over 5 years of tinkering with computers and electronics. Having developed an interest in hacking at the young age of 14, he has quickly been able to learn and dive deeper into advanced concepts of exploit and malware development. He has got to develop a variety of security tools ranging from simple keyloggers to advanced proof-of-concept malware like ransomware and spyware for Linux platforms. Besides cyber security, Nemuel is a software engineer with a focus on designing and building maintainable and scalable applications and systems using the Go and Python programming languages.
Curriculum
-
1
Course Outline
-
(Included in full purchase)
Course Outline
-
(Included in full purchase)
-
2
Introduction to Linux Malware
-
(Included in full purchase)
Introduction to the course
-
(Included in full purchase)
Demo of the finished project
-
(Included in full purchase)
-
3
Getting Started
-
(Included in full purchase)
Course requirements and Set up
-
(Included in full purchase)
-
4
Malware Development Part 1
-
(Included in full purchase)
Project setup
-
(Included in full purchase)
Connecting to the C2 Server
-
(Included in full purchase)
Receiving incoming commands
-
(Included in full purchase)
Sending back responses
-
(Included in full purchase)
Closing/terminating the connection
-
(Included in full purchase)
Changing directories
-
(Included in full purchase)
File transfer
-
(Included in full purchase)
-
5
Malware Development Part 2
-
(Included in full purchase)
Uploading file to machine
-
(Included in full purchase)
Downloading file from machine
-
(Included in full purchase)
Minor bug fixes
-
(Included in full purchase)
Taking screenshots
-
(Included in full purchase)
Achieving persistence
-
(Included in full purchase)
Executing shell commands
-
(Included in full purchase)
Testing with Netcat
-
(Included in full purchase)
-
6
Developing the Server
-
(Included in full purchase)
Project setup
-
(Included in full purchase)
Creating a listener
-
(Included in full purchase)
Accepting incoming connections
-
(Included in full purchase)
Loop to receive attacker’s commands
-
(Included in full purchase)
Handling the q/quit command
-
(Included in full purchase)
Receiving and saving screenshots
-
(Included in full purchase)
File download
-
(Included in full purchase)
File upload
-
(Included in full purchase)
Shell commands
-
(Included in full purchase)
Testing with our malware
-
(Included in full purchase)
-
7
Conclusion
-
(Included in full purchase)
Next steps
-
(Included in full purchase)
Ready to Master Linux Malware Development?
Take the leap towards a successful career in cybersecurity with our comprehensive course.
$64.99