Writing Malware Without Writing Code
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the intriguing world of malware creation without traditional coding in this 30-minute conference talk from BSidesLV 2017. Delve into Gal Bitensky's presentation on "Writing Malware Without Writing Code," which covers a range of topics including screenshot grabbers, keyloggers, ransomware, boot loops, and persistency techniques. Learn about the ground rules, scope of testing, and interesting results from vendor interactions. Gain insights into unconventional malware development methods and their potential implications for cybersecurity.
Syllabus
Intro
OUTLINE
EXAMPLES
GROUND RULES
SCOPE OF THE TEST
SCREENSHOT GRABBER
KEYLOGGER
RANSOMWARE
BOOTLOOP
PERSISTENCY
TEST SETUP
VENDORA
INTERESTING RESULTS
ANSWERS
Taught by
BSidesLV
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network