Writing Malware Without Writing Code
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the intriguing world of malware creation without traditional coding in this 30-minute conference talk from BSidesLV 2017. Delve into Gal Bitensky's presentation on "Writing Malware Without Writing Code," which covers a range of topics including screenshot grabbers, keyloggers, ransomware, boot loops, and persistency techniques. Learn about the ground rules, scope of testing, and interesting results from vendor interactions. Gain insights into unconventional malware development methods and their potential implications for cybersecurity.
Syllabus
Intro
OUTLINE
EXAMPLES
GROUND RULES
SCOPE OF THE TEST
SCREENSHOT GRABBER
KEYLOGGER
RANSOMWARE
BOOTLOOP
PERSISTENCY
TEST SETUP
VENDORA
INTERESTING RESULTS
ANSWERS
Taught by
BSidesLV
Related Courses
Early Detection through DeceptionYouTube Hack for Show, Report for Dough - Brian King
YouTube Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube Windows Event Logs - Zero to Hero
YouTube Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube