RRE5 - Losing Sanity while Developing Malware in C++ Hell
Viking Sec
blackhatcc programmingc/ccodingcreating a viruscybercyber securitydev logdeveloping malwaredll injectiongray hathackingmalwaremalware analysismalware devmalware developmentmalware development coffensive securityoffsecprocess injectionprocess injection techniquesransomwarereverse engineeringsoftware developmentspywaresystem programmingvirus developmentwhite hatwindows apiwindows malwarewriting malware
In this installment of Reverse Reverse Engineering, I lose my sanity when I realize how much more difficult it is to run injected code when string.h completely borks your malware. We're making progress though! I can now send data to a simple C2 built in Python Flask.
Like the series? Want to see me lose the rest of my sanity? Hit like to let the world know about my poor soul and consider subscribing.
"Scrape the Planet: Web Scrapers in Python" https://www.udemy.com/course/scrape-the-planet/
-- Twitter -- https://twitter.com/viking_sec
-- Patreon -- https://www.patreon.com/Viking_Sec
-- Table of Contents --
0:00 Intro 0:15 Ez Mode 0:30 Reality sets in 1:15 Debugging a remote thread 2:51 String.h Wrecks Me 4:38 Malware Demo 6:38 Feature/Code Overview 7:27 C2 Overview 7:58 Challenges and Solutions 9:08 Wrap-up 9:38 Outro
#malwaredevelopment #c++ #coding ... https://www.youtube.com/watch?v=HIsByPUvf0U
2021-12-18
0.0 LBC
Copyrighted (contact publisher)
46685189 Bytes