Introduction
  • Welcome to the course
  • Theory: Foreword, What is a rootkit?, Rootkit structure, Examples of rootkits
  • Introduction and setup - VIDEO TRAINING
Download your training source code and examples
  • Your ZIP package with the source code and examples
Basics of shellcode
  • Theory: Assembly language crash course, Register types, Instruction syntax
  • Basics of shellcode development - VIDEO TRAINING
Hiding processes, files and registry entries
  • Theory: Intro, Writing rootkit code, Hiding processes
  • Hiding processes - VIDEO TRAINING
  • Theory: Hiding files
  • Hiding files and directories - VIDEO TRAINING
  • Theory: Intro, Notes about the 64-bit mode, Hiding registry entries
  • Hiding registry entries - VIDEO TRAINING
Creating a backdoor and a keylogger
  • Theory: Creating a backdoor to a system, Keylogger, Taking a screenshot, Sending
  • Creating a keylogger - VIDEO TRAINING
  • Theory: Remote console
  • Creating a remote console - VIDEO TRAINING
Windows security features
  • Theory: What defense mechanisms are included in Windows?
  • Windows security features - VIDEO TRAINING
Creating undetectable applications
  • Theory: Understanding how antiviruses detect threats, Signatures
  • Creating undetectable applications - VIDEO TRAINING
  • Theory: Heuristics, Deceiving a heuristic scanner
  • Deceiving a heuristic scanner - VIDEO TRAINING
  • Theory: Emulation, RC4 overview, System calls and 64-bit architecture
  • Anti-emulation techniques - VIDEO TRAINING
Bypassing a firewall
  • Theory: Bypassing a firewall, Modifying the remote console
  • Bypassing a firewall - VIDEO TRAINING
Keeping a rootkit in a system
  • Theory: Areas for hiding programs, Running a program as a system service, Dll sp
  • Keeping a rootkit in a system - VIDEO TRAINING
Defense and rootkit detectors
  • Theory: Rootkit detectors
  • Defense and rootkit detectors - VIDEO TRAINING
Rootkit development and summary
  • Theory: Rootkit development and summary
  • Rootkit development and summary - VIDEO TRAINING
BONUS section
  • Become CISS - Certified Hacking Training - Monitoring Transmitted 1
  • Become CISS - Certified Hacking Training - Monitoring Transmitted 2
  • Become CISS - Certified Hacking Training - WiFi Security - Part 1
  • Become CISS - Certified Hacking Training - WiFi Security - Part 2
  • Become CISS - Certified Hacking Training - WiFi Threats and Attacks
  • Website Hacking in Practice - SQL Injection
  • BONUS LECTURE: Learn more and get to know our other courses
  • Thanks for joining