12-13-2021, 08:09 PM
Hi,
I am posting this here. This is a guide for malware development about 34 pages long that I made for myself along with diagrams .
I asked here (previous username was something else) & in many infosec communities on how to be a Malware Developer but didn't had any good response so I searched for myself.
If you do not trust the PDF File ; first download it and run it through a VirusScanner or VirusTotal .
I hope it helps you as it helped me (I keep coming back to it).
This assumes no knowledge of programming /computer science.
Use preferred lab setup as a reference. Do not follow it Toe - Toe. I have for example Win LTSC + Cygwin /Parrot Sec running along with a couple of Text Editors , IDEs and Libraries
Another thing to note, C & C++ are going to go extinct in near future ; Rust programming in Malwares will be widely used.
Python is literally the most bullshit language I have ever come across , do not use it to write actual large codebases.
https://mega.nz/file/Ys5wHbRa#wiyg-UYyTV...zWgjyN_y_s
Also have a look at this:
https://github.com/ronin-rb
Next up: Sektor 7 Malware Certs are shit I guess, same for SANS . If you want them , there is a website called hide01.ir that provides lab+book+video of every infosec cert.
Assoicated with HideZeroOne , is another group called Library-Sec-IR : These guys mantain a plethora of books related to topics in Advance Malware Development , APTs and Anti-Forensics.
Finally, if you are looking for people interested in this stuff; there aren't many. Only 200-300 in the entire world.
I have checked out 185 Discord Servers , 35 Telegram channels & what not.
Long Story short : All the malware authors and ransomware writers hangout on temp IRC Chatrooms. There are only 8 of these said chatrooms
Most red teamers will use out of the box payloads ; they will never use malware as it is out of legal scope.
Exploit Development is different. It's like college freshman maths.
Once you are done with this , you will want to know how malware writers are caught. Popular response is "Forensics" & "Reverse Engineering" ;
It's not.
Amateur writers will make a set of 12 mistakes that leads them to being caught ; someone who is writing an enterprise grade RaaS is & will mindfuck you.
If you want to know how things work in the real world ; start reading indictment paperwork , released investigative paperwork & FBI Financial Crimes stuff along with Europol.
Whatever you can get your hands on that is de-classified
Keep in mind , most countries do not have any infra to tackle cyber crime.
Rest done.
--------------------------
Good Day!
I am posting this here. This is a guide for malware development about 34 pages long that I made for myself along with diagrams .
I asked here (previous username was something else) & in many infosec communities on how to be a Malware Developer but didn't had any good response so I searched for myself.
If you do not trust the PDF File ; first download it and run it through a VirusScanner or VirusTotal .
I hope it helps you as it helped me (I keep coming back to it).
This assumes no knowledge of programming /computer science.
Use preferred lab setup as a reference. Do not follow it Toe - Toe. I have for example Win LTSC + Cygwin /Parrot Sec running along with a couple of Text Editors , IDEs and Libraries
Another thing to note, C & C++ are going to go extinct in near future ; Rust programming in Malwares will be widely used.
Python is literally the most bullshit language I have ever come across , do not use it to write actual large codebases.
https://mega.nz/file/Ys5wHbRa#wiyg-UYyTV...zWgjyN_y_s
Also have a look at this:
https://github.com/ronin-rb
Next up: Sektor 7 Malware Certs are shit I guess, same for SANS . If you want them , there is a website called hide01.ir that provides lab+book+video of every infosec cert.
Assoicated with HideZeroOne , is another group called Library-Sec-IR : These guys mantain a plethora of books related to topics in Advance Malware Development , APTs and Anti-Forensics.
Finally, if you are looking for people interested in this stuff; there aren't many. Only 200-300 in the entire world.
I have checked out 185 Discord Servers , 35 Telegram channels & what not.
Long Story short : All the malware authors and ransomware writers hangout on temp IRC Chatrooms. There are only 8 of these said chatrooms
Most red teamers will use out of the box payloads ; they will never use malware as it is out of legal scope.
Exploit Development is different. It's like college freshman maths.
Once you are done with this , you will want to know how malware writers are caught. Popular response is "Forensics" & "Reverse Engineering" ;
It's not.
Amateur writers will make a set of 12 mistakes that leads them to being caught ; someone who is writing an enterprise grade RaaS is & will mindfuck you.
If you want to know how things work in the real world ; start reading indictment paperwork , released investigative paperwork & FBI Financial Crimes stuff along with Europol.
Whatever you can get your hands on that is de-classified
Keep in mind , most countries do not have any infra to tackle cyber crime.
Rest done.
--------------------------
Good Day!