Completed
Attack Scenarios or Methods
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Patching Windows Executables With The Backdoor Factory
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Other Potential Titles
- 3 Overview
- 4 What is Patching
- 5 Security Pros and Patching
- 6 History of Patching
- 7 The MS Method
- 8 How Metasploit Patches
- 9 MSF Create Thread Method (Keep)
- 10 MSFVenom Win64 Patching Support
- 11 The Portable Executable Format
- 12 The Common Object File Format (COFF) Format
- 13 CTP Methods
- 14 How are code caves created?
- 15 Find Code Caves Demo
- 16 Solution: BDF
- 17 How BDF works
- 18 Original Way BDF Worked
- 19 DEMO - Prototyping shellcode
- 20 DEMO - Injector Module
- 21 Attack Scenarios or Methods
- 22 Mitigations - UPX Encoding
- 23 Mitigations - Self Validation
- 24 MSFVENOM keep vs MSVENOM non-keep vs BDF Cave Jumping
- 25 win32 BDF vs win64 BDF
- 26 Enterprise Mitigations
- 27 Progress on x64 Stager