Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101

4.15 (361 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING
7,240
students
5.5 hours
content
Nov 2023
last update
$64.99
regular price

What you will learn

Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Why take this course?

LAST UPDATED: 11/2023

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING

Ethical Hacking in Practice. Complete guide to rootkit and stealth software development. Practical ROOTKIT HACKING 101


Before we begin: the practical use of the course you are going to see has been proven by thousands of people all over the world – beginners and computer geeks as well. People who make their first steps in computer / network security and professionals: network administrators, programmers, pentesters, black- and white hat hackers. Please, read carefully what we'd like to share with you.

rootkit is a stealthy type of software, typically malicious, designed to hide the existence of certain processes or programs from normal methods of detection and enable continued privileged access to a computer. - definition by Wikipedia

  • You can ignore the fact that rootkits really exist,

  • You can pretend that goverment agencies don't use rootkits,

  • You can even believe that big companies don't spend huge amount of money for developing malicious software that can spy on you and your family,

  • You can just turn a blind eye on it and ignore these fact.


But it does not make the problem disappear.

Therefore we decided to face facts and show you how rootkits work, how they can hide inside your system, how to create such an invisible software, how to detect and protect against those threats.

This course covers all the important techniques related with ROOTKITS AND CREATING INVISIBLE SOFTWARE used by hackers, system administrators, pentesters and IT forensic analysts.

What you can expect from this course:

  • You'll learn how to create shellcode

  • You'll learn how to inject code into processes

  • You'll learn how to hide processes, files, directories and registry entries

  • You'll learn how to keep a rootkit in a system

  • You'll learn how to create a backdoor

  • You'll learn how to create an invisible keylogger and remote console

  • You'll learn how to make a screenshot

  • You'll learn how to create undetectable applications

  • You'll learn how to deceive Anti-Virus applications

  • You'll learn how to use anti-emulation techniques

  • You'll learn how to bypass a firewall

  • You'll learn how to create a rootkit detector

  • You'll learn how to protect against rootkits

  • And many other interesting topics


We guarantee your 100% satisfaction or you will get your money back. You have 30 days to decide if this course is for you. You will get access to the whole system. If for any reason you're not satisfied with your training, you will get a full refund. No questions asked.

Good luck and see you on the other side,
Andrew Harper || ITsec Academy || Hacking School Team

Reviews

Jy
February 6, 2024
It's a shame that the video lessons are given with background music that makes listening unbearable. In addition, the debugging and static analysis tools used are long outdated. A word for UDEMY, it would be more correct to put the edition dates of the proposed courses instead of the completely misleading update dates.
Misbah
February 6, 2024
Very nice, in addition to the explanation through video, there is also material in the form of PDF that can be read to deepen more, hopefully this knowledge can be useful for me in the future, thank you very much for the explanation.
E
August 16, 2022
people who gave 1 star review to this course is actually don't know anything about programming neither computer science if you want to understand this course you need to know about, Windows api, C/C++, x86 asm. Ppl just bought the course thinking they will be the next multi million dollar hacker or so. Yes he share's the content's in the last section where you can download and run the rootkit. But what is the point windows api by itself would only take 300hrs to learn stop giving bad review's to this guy without knowing about anything.
Marsie
August 18, 2020
Screen and many slides are hard to read. Instructor jumps around a lot. Overall structure is not presented.
Tylor
May 24, 2020
Im kind of not happy. I've known the general ideas on these topics, and I was hoping to learn how to do it myself. However, the pdf and the code are just no good. This is not teaching me what i hoped it would, instead i'm just compiling code that's not compatible with newer VS. We are calling functions and libraries which i dont think anybody doing this would just know the structure of
James
June 27, 2018
The course itself is obliviously being read by a machine. and all the downloaded material is not only an exact copy of the lectures but also very outdated. The course also claims to have been recently updated but they are still using visual studio 2010 and rarely respond to users questions. It is unfortunate that apparently whom ever put this course out is looking to make a quick buck and not actually teach. save your money, look for a course that actually has a teacher or organization that will respond to students and help someone learn.
Curtis
June 10, 2018
Course needs to be fully updated to 2018 operating systems etc seeming that it's a struggle to find any of the software. The pre-written code examples are too in depth. These ideally need to be explained step by step writing them as you go. Other than that the content is there it's just extremely difficult to understand in it's current format.
Roger
May 29, 2018
It's like learning to swim by being pushed out of an airplane over the Pacific. I have very little programming and had very little idea of what was going on in the first module. It should say only for experienced programmers. It would help to have an intro about rootkits, history, uses, examples, before diving into debugging programs.
Richard
November 28, 2017
excellent descriptions, well spoken, well organized, well delivered. invaluable material if you have any hope of becoming anything close to a legitimate cyber security analyst. great job!
Yakov
July 17, 2017
This is some good stuff right here. However, only people who been dealing with Malware and Windows C Programming should be taking this course. It requires a knowledge in C and some of the popular Windows API functions used by malware.
Charles
July 7, 2017
In depth and very well explained. It was great having downloadable content in addition to the video lectures. The Bonus Section was also a great plus. Covers a lot and the instructor is very knowledgeable.
Robin
June 19, 2017
This course is excellent. Topics are explained in-depth, plenty of exercises, videos are studio quality and backed with great amount of written material. Well done.
Samuel
February 21, 2017
This course was amazing! The creator of this course worked really hard on it in my perspective. I learnt a lot in this course! I would really recommend this course, if you want to learn hacking or IT Security.
Noah
August 25, 2016
Some videos referred to code I'd never seen before in the series and acted like it had already been explained.
Hubert
August 11, 2016
Really usefull. It shows the code injection technique and teaches how to hide the processes and its actions within the windows envorinment. Great course! :)

Charts

Price

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING - Price chart

Rating

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING - Ratings chart

Enrollment distribution

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING - Distribution chart

Related Topics

923134
udemy ID
8/4/2016
course created date
11/20/2019
course indexed date
Bot
course submited by