Jump to content

Rootkits and Stealth Apps: Creating & Revealing 2.0 HACKING


TheDukeOfHell

Recommended Posts

Over 30 lectures and 10 hours of content!

Lectures in PDF + Live Video Training

Free source code package to download

How to create shellcode

How to inject code

How to hide processes, files, directories and registry entries

How to keep a rootkit in a system

How to create a backdoor

How to create an invisible keylogger and remote console

How to make a screenshot

Creating undetectable applications

How to deceive Anti-Virus applications

How to use anti-emulation techniques

How to bypass a firewall

How to create a rootkit detector

How to protect against rootkits

Requirements

interest in ITsec and ethical hacking

some IT and programming basics (C/C++)

Who this course is for:

students interested in rootkit development

ethical hackers

system and network administrators

everyone interested in ethical hacking in general

ISA CISS, CEH, CISSP, MCSE, CCNA

 

 

This is the hidden content, please

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...