YoVDO

Writing Malware Without Writing Code

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Malware Analysis Courses Ransomware Courses Keylogger Courses

Course Description

Overview

Explore the intriguing world of malware creation without traditional coding in this 30-minute conference talk from BSidesLV 2017. Delve into Gal Bitensky's presentation on "Writing Malware Without Writing Code," which covers a range of topics including screenshot grabbers, keyloggers, ransomware, boot loops, and persistency techniques. Learn about the ground rules, scope of testing, and interesting results from vendor interactions. Gain insights into unconventional malware development methods and their potential implications for cybersecurity.

Syllabus

Intro
OUTLINE
EXAMPLES
GROUND RULES
SCOPE OF THE TEST
SCREENSHOT GRABBER
KEYLOGGER
RANSOMWARE
BOOTLOOP
PERSISTENCY
TEST SETUP
VENDORA
INTERESTING RESULTS
ANSWERS


Taught by

BSidesLV

Related Courses

Ethical Hacking mit Python in der Praxis: Der Komplettkurs
Udemy
Build Undetectable Malware Using C Language: Ethical Hacking
Udemy
Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
Udemy
Seguridad Informática desde Cero
Udemy
Ethical Hacking
freeCodeCamp