YoVDO

Writing Malware Without Writing Code

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Malware Analysis Courses Ransomware Courses Keylogger Courses

Course Description

Overview

Explore the intriguing world of malware creation without traditional coding in this 30-minute conference talk from BSidesLV 2017. Delve into Gal Bitensky's presentation on "Writing Malware Without Writing Code," which covers a range of topics including screenshot grabbers, keyloggers, ransomware, boot loops, and persistency techniques. Learn about the ground rules, scope of testing, and interesting results from vendor interactions. Gain insights into unconventional malware development methods and their potential implications for cybersecurity.

Syllabus

Intro
OUTLINE
EXAMPLES
GROUND RULES
SCOPE OF THE TEST
SCREENSHOT GRABBER
KEYLOGGER
RANSOMWARE
BOOTLOOP
PERSISTENCY
TEST SETUP
VENDORA
INTERESTING RESULTS
ANSWERS


Taught by

BSidesLV

Related Courses

Early Detection through Deception
YouTube
Hack for Show, Report for Dough - Brian King
YouTube
Blue Teamin on a Budget of Zero - Kyle Bubp
YouTube
Windows Event Logs - Zero to Hero
YouTube
Weaponizing Splunk - Using Blue Team Tools for Evil
YouTube