bypassing windows defender | Malware development

preview_player
Показать описание
//////////////////////////////// Support Me /////////////////////////////////
//////////////////////////////// resources /////////////////////////////////
/////////////////////////////// description ///////////////////////////////
in this video we show case how to bypass windows defender by getting a reverse shell that was created in c++ from github and make it undetectable based on what we have learned in the video.
we gonna learn about windows internals, windows api functions, how to use socket library, how windows defender works, how obfuscation works, what is obfuscation
Windows Defender bypass
Reverse shell creation
C++ reverse shell
GitHub reverse shell
Malware development 101
Undetectable reverse shell
Windows internals
Windows API functions
Socket library usage
Windows Defender detection evasion
Obfuscation techniques
Obfuscation methods
Understanding obfuscation
Windows security bypass
Anti-virus evasion techniques
Malware evasion tactics
Hacking Windows defenses
Reverse engineering Windows
Cybersecurity bypass techniques
Exploiting Windows vulnerabilities
Bypassing antivirus software
Avoiding detection by Windows Defender
-----------------------------------MENU-----------------------------------
00:00 intro
00:28 - plan of the video
00:48 - what is win defender & how it works
01:10 - static analysis ( signature detection )
03:03 - checking for imports
03:29 - entropy
04:01 - dynamic analysis
04:41 - simple reverse shell from github
04:51 - exclude the github reverse shell from windows defender
04:56 - the tools we gonna use
05:20 - explaining the simple reverse shell
05:46 - what the hack is a windows socket
07:16 - getting back to code
09:55 - running the first part of the code
10:15 - starting the cmd process
11:58 - running our reverse shell
12:44 - why windows defender detect us
13:03 - what is obfuscation
13:31 - create the obfuscation function
14:35 - creating the getoriginal string function
14:47 - the question that will come to your mind
15:12 - load the library in the run time
15:44 - calling the functions from the loaded library
16:19 - the final version of our code
17:11 - the import address table
17:53 - explaining one part
14:47 - the question that will come to your mind
18:38 - running our obfuscated shell

---------------------------------------------------------------------------------
The content in this video is for educational purposes only. We do not promote or condone any illegal activity or hacking without the expressed
written consent of the target. Any actions taken by viewers based on the content of this video is solely at their own risk and we will not be held
liable for any damages or legal consequences that may arise.
Рекомендации по теме
Комментарии
Автор

to confuse the enemy, you must confuse yourself.
--- sun tzu

destiny_
Автор

Thank you for your effort
an adequate and professional explanation of the checking and skipping process. How lucky I was to visit your channel.

rabih.khaddour
Автор

Wow, I love the way you breaks it into pieces. You gain another subscriber

federickwoodsjones
Автор

First comment, such a good video. Keep up the good work 💯💪

ismailajizou
Автор

When you are trying to test malware please turn off automatic sample submission, and cloud deliver protection...if you turn on this the malware no longer stealth..it will be detected by defender

Chinmoy-bfcz
Автор

Great video. It could be an error on obfuscation fiunction? WsaStartup should be 48, 18, 0, 44, 19, 0, 17, 19, 20, 15 ?

asso
Автор

More than excellent!!! Very informative and great work. Hard work can be seen here.

idkk
Автор

really good video, informative and interesting! keep up the good work!

xendod
Автор

Holy crap this was such a fantastic video. You're very underrated, keep at it!!

khaelkugler
Автор

That isn't signature detection. Signature detection takes a sha hash of the entire file and compares it against a database of known malicious hashes. Only looking at strings is a bad and unreliable way to detect malware.

mikaay
Автор

You just teach us as a LOW-LEVEL Teacher!!

neo-override
Автор

How does this video only have 1K likes?? So underrated

owainlogan
Автор

Excellent material presented in an easy-to-understand manner.
Keep it up brother.

mohamedboutaleb
Автор

great vedio!!!! please never give up and always keep going your vedios are great its like dimond in my eye

adamchalabi
Автор

i havent tested it but you seem to have done a great job. high qualty vids. Would it be possible to use genetic algorithm to randomize each malware or would obfuscation be enough

muhammad-dqjg
Автор

Good stuff . I really enjoyed watching and learning thank you !

abdelghafourbouhdyd
Автор

Hi, i am trying to run the c++ code but i am unable to run it, it gives me the following error:

::sockaddr_in has' has incomplete type and cannot be defined

How can I fix this? Am i missing a step or something? I am not very familiar wih C++

Abdul-ur
Автор

Hey man great video ❤, waiting for ur edr evasion course:)

soumyanilbiswas_reveng
Автор

You are the best I used you method to my python script and it works perfectly well

francisakwasi
Автор

Salam 3aleykoum god bless you this is intresting video im french and its so hard to understant english for me while i speak well.. weird but if i understood this is cuz you are good educator

nassimamrane
welcome to shbcf.ru