Writing Malware Without Writing Code
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the intriguing world of malware creation without traditional coding in this 30-minute conference talk from BSidesLV 2017. Delve into Gal Bitensky's presentation on "Writing Malware Without Writing Code," which covers a range of topics including screenshot grabbers, keyloggers, ransomware, boot loops, and persistency techniques. Learn about the ground rules, scope of testing, and interesting results from vendor interactions. Gain insights into unconventional malware development methods and their potential implications for cybersecurity.
Syllabus
Intro
OUTLINE
EXAMPLES
GROUND RULES
SCOPE OF THE TEST
SCREENSHOT GRABBER
KEYLOGGER
RANSOMWARE
BOOTLOOP
PERSISTENCY
TEST SETUP
VENDORA
INTERESTING RESULTS
ANSWERS
Taught by
BSidesLV
Related Courses
Malicious Software and its Underground Economy: Two Sides to Every StoryUniversity of London International Programmes via Coursera Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax Android Malware Analysis - From Zero to Hero
Udemy How to Create and Embed Malware (2-in-1 Course)
Udemy