Companies Home Search Profile

Antivirus Evasion - Process Injection and Migration

Focused View

Moreblessing Matake

1:34:02

0 View
  • 1 -Introduction.mp4
    03:02
  • 2 -What is Process Injection & Migration.mp4
    01:23
  • 1 -Welcome.mp4
    00:55
  • 2 -Installing VMware Pro.mp4
    05:21
  • 3 -Downloading Kali & Windows 11 VM.mp4
    01:57
  • 4 -Setting Up Machines On VMware.mp4
    06:23
  • 5 -Getting Kali The Evader Ready.mp4
    03:21
  • 6 -Getting Windows 11 VM Ready.mp4
    03:03
  • 7 -Installing Visiual Studio.mp4
    05:26
  • 1 -Classic Process Injecton.mp4
    17:12
  • 2 -Process Hallowing.mp4
    12:52
  • 3 -Unhooking AV Hooks.mp4
    13:07
  • 4 -Unhooking AV ntdl.dll through PerunsFart.mp4
    05:10
  • 5 -Section Maps.mp4
    03:45
  • 6 -Thread Context.mp4
    05:12
  • 7 -Asynchronous Procedure Calls.mp4
    05:32
  • 1 -Wrap Up.mp4
    00:21
  • Description


    Learn Hands-On In Cyber-Security How Red Teamers and Threat Actors (APT) Evade Security Mechanisms in the Real World

    What You'll Learn?


    • Ethical Hacking
    • Installing Kali Linux & Windows Virtual Machines
    • Crafting Undetectable Payloads that Bypasses A fully UpTo date Windows Defender Antivirus using Metasploit Shellcode, C# Codes and C++ e.t.c
    • Cyber Security
    • Process Injection & Migration
    • Antivirus Solution Evasion

    Who is this for?


  • Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism
  • Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security
  • Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild
  • What You Need to Know?


  • A computer with 8GB ram to support 2 VMs running at the same time
  • Basic understanding of operating systems
  • Strong will to learn & creative mindset
  • If you like Hands-On, well this is the course for you, we do Hands-On here
  • More details


    Description

    This course provides a comprehensive study of process injection and process migration techniques, essential for understanding advanced malware behavior and penetration testing. Participants will explore how attackers use these techniques to execute malicious code, bypass security measures, and evade detection.

    The course covers a range of key techniques, including Classic Process Injection, Process Hollowing, Unhooking AV Hooks, and Unhooking AV ntdll.dll using PerunsFart. These methods allow attackers to stealthily manipulate and hijack legitimate processes. Students will also learn advanced concepts such as Section Mapping, where memory regions are manipulated for stealthy code execution, and Thread Context manipulation to hijack thread execution.

    Additionally, participants will explore Asynchronous Procedure Calls (APCs), which allow attackers to queue code execution within a target process, adding to their toolkit of stealth techniques. Emphasis will be placed on understanding how these techniques are used in real-world attacks and how defenders can detect and mitigate them.

    Through hands-on labs and case studies, students will gain practical experience in both the offensive use of these techniques and defensive measures, such as behavioral monitoring and memory analysis. The course will also explore detection strategies using modern tools and methodologies like advanced endpoint detection and response (EDR) systems.

    By the end, participants will have a deep understanding of process injection and migration, equipping them to defend against these sophisticated attack methods.

    Prerequisites: Basic knowledge of operating systems, programming, and cybersecurity fundamentals.

    Who this course is for:

    • Red Teamers - Leveling their skills in their world of compromising systems & evading security mechanism
    • Blue Teamer - Learn how threat actors work or move in the wild, so they can defend better, protect their systems and educate their fellow workers for better security
    • Any-One - Off course, anyone in the Cyber Security field who just wanna learn or know how threat actors act in the wild

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Moreblessing Matake
    Moreblessing Matake
    Instructor's Courses
    Hello and welcome! I am thrilled to have the opportunity to introduce myself to you. As a content creator, I have dedicated the last two years to honing my skills and perfecting my craft in the ever-evolving digital landscape.With a keen eye for captivating storytelling and an inherent knack for engaging an audience, I have had the privilege of working on various projects that span across different mediums. From writing compelling blog articles and scripting attention-grabbing videos to designing visually stunning graphics, my journey as a content creator has allowed me to explore and excel in multiple creative avenues.While my prowess as a content creator remains a prominent aspect of my professional journey, it is my unwavering passion for cyber security that truly sets me apart. With an insatiable curiosity about digital threats and a desire to safeguard both individuals and organizations in an increasingly interconnected world, I have dedicated countless hours to studying the intricate intricacies of cyber security.Through extensive research, practical experience, and continuous learning, I strive to stay at the forefront of the latest trends and techniques in this dynamic field. My goal is to not only educate and raise awareness about potential digital risks but also empower others to navigate the digital landscape with confidence and security.As we embark on this course together, I am eager to share both my expertise as a content creator and my passion for cyber security. Through interactive discussions, practical exercises, and collaborative projects, let us delve into the realms of creativity and online security to develop the skills necessary for success in the digital realm.I am excited about the possibilities that lie ahead, and I look forward to learning and growing alongside each of you in this course. Thank you for joining me on this journey to explore the world of content creation and cyber security. Let's embark on this adventure together!
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 17
    • duration 1:34:02
    • Release Date 2024/12/25