Malware Development in C | Coding a basic Reverse Shell

preview_player
Показать описание
Hello everyone! Hope you are doing great, I am back again with a new video on the Malware Development Series, Today we are going to code a very basic reverse shell in C using socket programming. In the next video, We shall take a look at executing shellcode using various Windows API Functions. Thank you and have a nice day!

Resources:

Social Media:

Note:
All videos and tutorials are for informational and educational purposes only. I believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. We believe that it is impossible to defend yourself from hackers without knowing how hacking is done. The tutorials and videos provided on this channel are only for those interested in learning about Ethical Hacking, Security, and Penetration Testing. Hacking tutorials are against the misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used.
Рекомендации по теме
Комментарии
Автор

bro its my first time seeing a really good video like this. I appreciate that you dont add a background music and fastforward the typing part and explaining nothing. Subbed

raypunn
Автор

This is really good tutorial, I thought we will receive messages from the server then execute them as command but turn out we can open a damn cmd on the victim machine @@! Nice tutorial bro!

NguyenYellow
Автор

Great video! Could you showcase how to create a R.A.T compiling c and golang?

richoffremo
Автор

Nice one brother keep going more things like this. i ve tested and verified it works😁

jajabink
Автор

Sir please make a video on how to do an ICMP tunneling attack and gain reverse shell by bypassing firewalls

josinjojy
Автор

man, I love your channel, it's awesom
thanks for this video

maval
Автор

Thanks for this video as well as the first one.
Typo error: the sockaddr_in line should start with the struct keyword.

coresec
Автор

this video is very useful for me thanks brother

HunterXnotDefine
Автор

Can you do a video where you explain socket ?

silme
Автор

Hope you do an adware tutorial in the future, I used to watch a video about an adware which will start on start up, then when user search in browser it will replace google with its search engine and the results are its affiliate links. That concept seems really cool and I wonder if we can accomplish that using C/C++? I would be really appreciate if you make a video about that. Thanks

NguyenYellow
Автор

Great video, why to close the handles when the process is about to finish?

Автор

Hi, why when I launch the rev-shell does it ask me to choose the application with which to open? while I just want to run the program to listen with linux? please^^

briiiochee
Автор

Great tutorial! Thank you. It worked, but after a couple seconds Windows Defender blocked and deleted the exe.

matyasmarkkovacs
Автор

Can we convert it form .cpp to .c ?? Please reply sir

josinjojy
Автор

thank you for this video. Could you please demostrate how to upload and download a file with this reverse shell.

kawsalyar
Автор

Thanks men for such good content, I have a query when I got connection and as you said at 23:15 press any key but when I press any key It not work even when I hit enter it close netcat(NC)

ahtashama
Автор

in the socket error if condition, shouldn't he be calling exit(1) to indicate a failure instead of exit (0)

mdadilhussain
Автор

how to make fileless malware like payload. I couldn't execute my shellcode.

fideliorainbow
Автор

Hey sir! Using access tokens, wouldn't it be possible to launch a administrator process on the host machine this way?

michaelswahla
Автор

Sir can you do a video on how to bypass windows firewall and access the machine without touching. Please reply sir

josinjojy