Patching Windows Executables With The Backdoor Factory

Patching Windows Executables With The Backdoor Factory

via YouTube Direct link

How are code caves created?

14 of 27

14 of 27

How are code caves created?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Patching Windows Executables With The Backdoor Factory

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Other Potential Titles
  3. 3 Overview
  4. 4 What is Patching
  5. 5 Security Pros and Patching
  6. 6 History of Patching
  7. 7 The MS Method
  8. 8 How Metasploit Patches
  9. 9 MSF Create Thread Method (Keep)
  10. 10 MSFVenom Win64 Patching Support
  11. 11 The Portable Executable Format
  12. 12 The Common Object File Format (COFF) Format
  13. 13 CTP Methods
  14. 14 How are code caves created?
  15. 15 Find Code Caves Demo
  16. 16 Solution: BDF
  17. 17 How BDF works
  18. 18 Original Way BDF Worked
  19. 19 DEMO - Prototyping shellcode
  20. 20 DEMO - Injector Module
  21. 21 Attack Scenarios or Methods
  22. 22 Mitigations - UPX Encoding
  23. 23 Mitigations - Self Validation
  24. 24 MSFVENOM keep vs MSVENOM non-keep vs BDF Cave Jumping
  25. 25 win32 BDF vs win64 BDF
  26. 26 Enterprise Mitigations
  27. 27 Progress on x64 Stager

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.