
11.39 GB | 41min 55s | mp4 | 1920X1080 | 16:9
Genre:eLearning |Language:English
Files Included :
1 - Introduction.mp4 (7.2 MB)
55 - What is lsass process in windows.mp4 (26.46 MB)
56 - How do we steal the password from lsass process in windows.mp4 (54.58 MB)
57 - Understanding Windows API functions used in finding the target process id.mp4 (75.62 MB)
58 - Understanding the program logic of process id lsassexe finding program.mp4 (135.63 MB)
59 - Practical demonstration of finding the process id of lsass in Windows.mp4 (38.26 MB)
60 - Understanding the program flow of password stealing program from lsass process.mp4 (73.61 MB)
61 - Practical demonstration of dumping the memory of lsass process from our malware.mp4 (105.3 MB)
62 - Extracting the password hashes from the lsass dump file.mp4 (67.52 MB)
2 - Lab setup 1.mp4 (12.19 MB)
10 - Understanding PE sections in windows.mp4 (160.92 MB)
11 - Understanding token handle and thread of a process.mp4 (71.96 MB)
12 - Understanding token information in process hacker.mp4 (295.09 MB)
13 - Understanding handle table information.mp4 (43.21 MB)
14 - Understanding threads in process hacker.mp4 (53.91 MB)
3 - What is a malware and its types.mp4 (12.16 MB)
4 - Introduction to PE file structure.mp4 (217.31 MB)
5 - Understanding MSDOS Header in PE file of windows.mp4 (532.63 MB)
6 - Understanding DOS stub in PE file of windows.mp4 (160.53 MB)
7 - PE Header section structure Basics.mp4 (187.54 MB)
8 - Understanding PE Headers subsections Signature File Header and OptionalHeader.mp4 (979.85 MB)
9 - Understanding PE Section Headers.mp4 (732.7 MB)
15 - What is a Handle in windows.mp4 (602.77 MB)
16 - Windows Handle example Finding out running program using windows handle.mp4 (103.35 MB)
17 - Windows Handle example Hiding minimizing maximizing running program.mp4 (108.54 MB)
18 - Lab configuration in Malware development machine.mp4 (242.5 MB)
19 - Deep diving into CreateProcess function and understanding its input parameters.mp4 (702.27 MB)
20 - Creating a process using CreateProcess function.mp4 (381.51 MB)
21 - How can we hide a program using STARTUPINFO structure flags.mp4 (93.68 MB)
22 - Hiding program practical demonstration.mp4 (154.82 MB)
23 - Hiding program using CreateProcess function flags in windows.mp4 (148.08 MB)
24 - Hiding console programs in windows.mp4 (91.02 MB)
25 - Understanding inherit handles in CreateProcess function in windows.mp4 (509.76 MB)
26 - Practical demonstration of inherit handle in CreateProcess function.mp4 (510.08 MB)
27 - How to set custom environment variable for child process in windows.mp4 (66.11 MB)
28 - How to set custom working directory for child process in CreateProcess function.mp4 (79.05 MB)
29 - How to open a process using OpenProcess windows api function.mp4 (26.42 MB)
30 - Understanding CreateThread function working in windows.mp4 (57.37 MB)
31 - Practical demonstration of thread creation with CreateThread windows function.mp4 (106.71 MB)
32 - How to execute a shellcode with CreateThread function.mp4 (112.23 MB)
33 - Practical demonstration of executing a shellcode with CreateThread function.mp4 (225.82 MB)
34 - Understanding ANSI and UNICODE in windows programming.mp4 (5.34 MB)
35 - Understanding how to inject code into other running processes in windows.mp4 (130.57 MB)
36 - Practical demonstration of malware code injection into other processes in window.mp4 (74.53 MB)
37 - Understanding DLL injection attack in windows.mp4 (173.17 MB)
38 - Practical demonstration of DLL injection attack in windows.mp4 (58.08 MB)
39 - Understanding DLL hijacking concept in windows.mp4 (47.7 MB)
40 - dll-hijacking.zip (130.17 KB)
40 - Practical demonstration of DLL hijacking in windows.mp4 (99.47 MB)
41 - Understanding APC code injection technique.mp4 (249.87 MB)
42 - APC injection practical demonstration in windows.mp4 (168.14 MB)
43 - Malware persistence using registry entry.mp4 (138.45 MB)
44 - Practical demonstration of Malware persistence using registry entry.mp4 (263.52 MB)
45 - Malware persistence via Winlogon.mp4 (43.55 MB)
46 - Practical demonstration of malware persistence via Winlogon.mp4 (279.31 MB)
47 - Understanding malware persistence by creating Malicious Windows Services.mp4 (157.69 MB)
48 - Practical demonstration of malware persistence via creating Windows Service.mp4 (639.93 MB)
49 - Understanding basic token theft concept.mp4 (79.99 MB)
50 - How to enable SeDebugPrivilege understanding basic concept.mp4 (50.06 MB)
51 - Understanding the working of enable SeDebugPrivilege program.mp4 (242.05 MB)
52 - Practical demonstration of enabling SeDebugPrivilege of a program token.mp4 (90.78 MB)
53 - Understanding the basic steps of how to steal token of winlogon process.mp4 (16.83 MB)
54 - Practical demonstration of stealing token of winlogon process.mp4 (284.93 MB)]
Screenshot

RapidGator
NitroFlarehttps://rapidgator.net/file/e9c0007d6fc9c9b48b39ab1562a2e08d/
https://rapidgator.net/file/9cc1209310089b2a07c9f07a9054c95d/
https://rapidgator.net/file/04d4855373caac73809c6b9842e7ac44/
https://rapidgator.net/file/74e6fdd4dde568b3f737e0c011150c7c/
https://rapidgator.net/file/fa6c3c1b580b1fffd1f090efe8415cfd/
https://rapidgator.net/file/e3bbcc6b449a5ce0c89a4a81120e9c03/
https://rapidgator.net/file/e280365e1e3793574e3e903e953bc010/
https://rapidgator.net/file/c7e016ac0cfa292f39f9016de5d401fe/
https://rapidgator.net/file/2afd8855267b0b7c1144e2f72ab061be/
https://rapidgator.net/file/07b8394e755d1f2aadcd1132cccbea4f/
https://rapidgator.net/file/000015601b5b9a1b5612ffa5dba9ed5e/
https://nitroflare.com/view/42BF579107F2B99/
https://nitroflare.com/view/E3A18F01D58CEC1/
https://nitroflare.com/view/A12934927D9A55B/
https://nitroflare.com/view/268F5E6D1AA36F9/
https://nitroflare.com/view/5F3BBC3C7A256A4/
https://nitroflare.com/view/42C7BF98EBD049B/
https://nitroflare.com/view/7C13F20D6D13820/
https://nitroflare.com/view/62B62E170666514/
https://nitroflare.com/view/353BB703DBD50CF/
https://nitroflare.com/view/CCA87318FADCFA3/
https://nitroflare.com/view/C72C9C8DB010146/
Feel free to post your Malware Development for Ethical Hackers and Pentesters Free Download, torrent, subtitles, free download, quality, NFO, Dangerous Malware Development for Ethical Hackers and Pentesters Torrent Download, free premium downloads movie, game, mp3 download, crack, serial, keygen.