faan ross
faan ross
  • 36
  • 39 948
what is a process | malware development foundations
a short lesson as part of a new series meant to supplement my other malware development courses by providing some valuable theoretical insights.
in this inaugural lesson we'll look at the fundamental abstract unit of the windows OS - the process. inspired by the work of the great pavel yosifovich.
live long and prosper,
x
zhlédnutí: 363

Video

C# payload mastery 04 - aes encryption
zhlédnutí 612Před 3 měsíci
link to code: encryption = github.com/faanross/payloads_mastery/blob/master/04a_encryption_aes.cs decryption = github.com/faanross/payloads_mastery/blob/master/04b_decryption_payload_aes.cs decryption breakpoints = github.com/faanross/payloads_mastery/blob/master/04c_decryption_payload_aes_debug.cs computerphile video on aes encryption theory = czcams.com/video/O4xNJsjtN6E/video.html in this fo...
C# payload mastery 03 - basic evasion + time-delayed execution + junk code insertion
zhlédnutí 1,2KPřed 4 měsíci
NOTE: This is a reupload, original video was uploaded 16 April 2024, but contained an egregious error, corrected here. link to code: github.com/faanross/payloads_mastery/blob/master/03_basic_evasion_time_delay_junk_code.cs previous video: czcams.com/video/G7bfsQ8XQXI/video.html in this third lesson we'll learn about some basic detection theory and use that framework to make 7 improvements to ou...
C# payload mastery 02 - remote shellcode + hide console
zhlédnutí 672Před 5 měsíci
link to code: github.com/faanross/payloads_mastery/blob/master/02_remote_payload.cs previous video: czcams.com/video/wxslev_yha4/video.html in this second lesson we'll build on our code from the previous lesson and implement 2 major improvements: - switch from hardcoded to remotely-hosted shellcode - hide our console window upon payload execution live long and prosper, x timestamps 00:00 - intr...
C# payload mastery 01 - simple C# shellcode loader
zhlédnutí 1,6KPřed 6 měsíci
link to code: github.com/faanross/payloads_mastery/blob/master/01_simple_backdoor.cs note: code can also be found right at the bottom of this description. defcon 27 c# backdoor: github.com/mvelazc0/defcon27_csharp_workshop p/invoke signatures in c#: czcams.com/video/baj9IpB_Z6Y/video.html in this first lesson we'll: - use msfvenom to generate shellcode - create a simple C# loader that will perf...
C# payload mastery 00 - course introduction
zhlédnutí 894Před 6 měsíci
C# course*: czcams.com/video/GhQdlIFylQ8/video.html OOP course*: czcams.com/video/SiBw7os-_zI/video.html win10 with fully disabled defender: czcams.com/video/fLpI9Z60ZDQ/video.html * = apologies, i said free code academy in the video, it's free code camp. a brief overview of my upcoming c# course: - who the course is for - what we'll cover - what you need to know - what you'll learn - what setu...
pass-the-hash attack for windows privilege escalation
zhlédnutí 1,2KPřed 7 měsíci
in this lesson we perform a pass-the-hash attack to escalate our privilige: - we start off as a lower-level user - we discover a keepass database - we use smb to exfiltrate the database to our system - we use keepass2john to extract the database hash - we use hashcat to crack the database hash - we discover a ntlm hash inside of the database - we use the ntlm hash pthwinexe to spawn a new shell...
the world’s simplest custom payload (hackthebox jeeves ctf walkthrough)
zhlédnutí 712Před 7 měsíci
- to previous jeeves video czcams.com/video/0ybE6F0d7fc/video.html - to juicy potatio github eternallybored.org/misc/netcat/ - juicy potato release page: github.com/ohpe/juicy-potato/releases - impacket github github.com/fortra/impacket - netcat for windows eternallybored.org/misc/netcat/ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ in this lesson we perform the manual juicy potato attack ag...
HackTheBox Jeeves CTF walkthrough - Juicy Potato Attack
zhlédnutí 972Před 7 měsíci
link to hacktricks overview of juicy potato attacks: book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation/juicypotato link to htb jeeves: app.hackthebox.com/machines/114 in this video we explore privilege escalation via a juicy potato attack. we'll attack the hackthebox machine called 'jeeves', here using metasploit, while in the following video we'll follow a manual approac...
HackTheBox Chatterbox CTF walkthrough - Found Credentials + Buffer Overflow
zhlédnutí 310Před 7 měsíci
HackTheBox Chatterbox CTF walkthrough - Buffer Overflow Found Credentials link to htb chatterbox: app.hackthebox.com/machines/123 in this video we explore privilege escalation via found credentials. we'll attack the hackthebox machine called 'chatterbox'. initial foothold is obtained by running a buffer overflow attack against a vulnerable service called 'achat'. twitter: @faanross #cybersecuri...
HackTheBox Devel CTF walkthrough - Privilege Escalation via Kernel Exploitation Manual Approach
zhlédnutí 1,3KPřed 8 měsíci
link to previous video: czcams.com/video/BRurEae5vHo/video.html link to htb devel: www.hackthebox.com/machines/devel link to introductory lecture on kernel exploitation czcams.com/video/xHHmoEsJc58/video.html in this video second video on kernel exploitation we'll once again use it to elevate our privs against Devel (hackthebox). this time around we're following a more manual approach without t...
HackTheBox Devel CTF walkthrough - Privilege Escalation via Kernel Exploitation with Metasploit
zhlédnutí 567Před 8 měsíci
link to htb devel: www.hackthebox.com/machines/devel link to introductory lecture on kernel exploitation czcams.com/video/xHHmoEsJc58/video.html in this video we explore privilege escalation via kernel exploitation, with the aid of metasploit. we'll attack the hackthebox machine called 'devel'. twitter: @faanross #cybersecurity #redteaming #c2
Creating a simple C2 LoTL backdoor (Red Team Series 005)
zhlédnutí 173Před 8 měsíci
link to jon strand's pay-what-you-can classes: www.antisyphontraining.com/pay-what-you-can/ link to the linux cli lab (jon strand github repo): github.com/strandjs/IntroLabs/blob/master/IntroClassFiles/Tools/IntroClass/LinuxCLI/LinuxCLI.md link to liveoverflow video - what is a file format?: czcams.com/video/VVdmmN0su6E/video.html link to learn-linux-tv video - data streams (stdin, stdout & std...
TryHackMe CTF Walkthrough - Pickle Rick
zhlédnutí 483Před 8 měsíci
In this beginner-friendly CTF walkthrough from TryHackMe we will: - use nmap to enumerate ports/services - use gobuster to discover hidden directories and files on the web server - discover login credentials hidden on the pubic web directory - use this to log into a portal - execute remote commands from the portal on the web server - use this to get a reverse shell on target - on target we disc...
C2 Host Enumeration using LOTL techniques (Red Team Series 004)
zhlédnutí 174Před 8 měsíci
C2 Host Enumeration using LOTL techniques (Red Team Series 004)
THREAT HUNTING DLL-injected C2 beacons FOR BEGINNERS 02 - Setup
zhlédnutí 1,4KPřed 8 měsíci
THREAT HUNTING DLL-injected C2 beacons FOR BEGINNERS 02 - Setup
C2 Domain Enumeration using Powerview and LOTL (Red Team Series 003)
zhlédnutí 171Před 8 měsíci
C2 Domain Enumeration using Powerview and LOTL (Red Team Series 003)
TryHackMe CTF Walkthrough - Mr. Robot
zhlédnutí 3,7KPřed 9 měsíci
TryHackMe CTF Walkthrough - Mr. Robot
Basic C2 defense evasion by creating a custom dropper (Red Team Series 002)
zhlédnutí 248Před 9 měsíci
Basic C2 defense evasion by creating a custom dropper (Red Team Series 002)
C2 setup + exploitation with Metasploit
zhlédnutí 731Před 9 měsíci
C2 setup exploitation with Metasploit
How to fully disable MS Defender for Red Teaming
zhlédnutí 277Před 9 měsíci
How to fully disable MS Defender for Red Teaming
How to set up a simple Active Directory environment for Red Teaming
zhlédnutí 458Před 9 měsíci
How to set up a simple Active Directory environment for Red Teaming
TryHackMe CTF Walkthrough - Basic Pentesting
zhlédnutí 804Před 9 měsíci
TryHackMe CTF Walkthrough - Basic Pentesting
THREAT HUNTING DLL-injected C2 beacons FOR BEGINNERS 01 - Intro
zhlédnutí 257Před 9 měsíci
THREAT HUNTING DLL-injected C2 beacons FOR BEGINNERS 01 - Intro
What is Threat Hunting pt 1 - Different Strokes for Different Folks
zhlédnutí 234Před 10 měsíci
What is Threat Hunting pt 1 - Different Strokes for Different Folks
Python Cybersecurity for Beginners: Scanners Part 5 - Wrapper
zhlédnutí 620Před rokem
Python Cybersecurity for Beginners: Scanners Part 5 - Wrapper
Python Cybersecurity for Beginners: Scanners Part 4 - OS Fingerprinting
zhlédnutí 435Před rokem
Python Cybersecurity for Beginners: Scanners Part 4 - OS Fingerprinting
Python Cybersecurity for Beginners: Scanners Part 3 - Service Fingerprinting
zhlédnutí 656Před rokem
Python Cybersecurity for Beginners: Scanners Part 3 - Service Fingerprinting
Python Cybersecurity for Beginners: Scanners Part 2 - Port Scanner
zhlédnutí 604Před rokem
Python Cybersecurity for Beginners: Scanners Part 2 - Port Scanner

Komentáře

  • @Zodic_Z
    @Zodic_Z Před 4 dny

    100 perent effort and 0 viewers. very underrated channel. keep the gud work buddy

  • @ivanomaras2776
    @ivanomaras2776 Před 5 dny

    Hacked

  • @cyberancap
    @cyberancap Před 7 dny

    this is perfection haha

  • @ossiuvgk9049
    @ossiuvgk9049 Před 9 dny

    thank you dude

  • @dexterrrrrrrrr
    @dexterrrrrrrrr Před 9 dny

    great content brother thx

  • @Yohan421-e5g
    @Yohan421-e5g Před 11 dny

    FIRE, first time understanding someone's script after some time of self studying python and automation!

  • @lucaciraolo958
    @lucaciraolo958 Před 18 dny

    i'm about to start a master degree in cybersecurity and wanted to learn something by my own before the course... and bro yours is amazing. Love the way u teach and how u dont speed-up things, very well done job and thx for everything im gonna learn.

  • @DBX79
    @DBX79 Před 20 dny

    This tutorial goes by so quickly. Was this under the assumption that someone already knows basic coding?

    • @Beyondlimits_400
      @Beyondlimits_400 Před 18 dny

      Yeah he should really take out the beginners from the title. He just sped by this as if you already know how to build a script in Python.

    • @theuxofai3907
      @theuxofai3907 Před 18 dny

      @@Beyondlimits_400yeah i know its ridiculous! we should all demand a refund!!

    • @Beyondlimits_400
      @Beyondlimits_400 Před 18 dny

      @@theuxofai3907 Yes it’s free lol, with that my point is that it’s a bit of a shitty course if it’s aimed at people who have never coded.

    • @theuxofai3907
      @theuxofai3907 Před 18 dny

      @@Beyondlimits_400if you find it shitty literally stop watching and choose among the other 1000s of free python courses at your level lol. You think he can make a single course for literally where every single person is at? Hilarious entitlement lol.

    • @theuxofai3907
      @theuxofai3907 Před 18 dny

      @@Beyondlimits_400this is extremely simple btw, if you are looking for an INTRODUCTORY course, just look for that.

  • @93ksj
    @93ksj Před 22 dny

    Love the content bro, new subscriber!

  • @adityagowda5810
    @adityagowda5810 Před 24 dny

    How to execute it without hack the bix

  • @hadirihan9337
    @hadirihan9337 Před 28 dny

    sorry for how late this comment is but i dont understand what the git gud and lobo is nor where do I access it , I figured out how to import scrappy but im a bit confused as i feel some steps were skipped btw i use pycharm

  • @priyanshuchoudhary3970

    just wow 👏

  • @f1shh-sec
    @f1shh-sec Před měsícem

    I love the art style on the asii gifs! who is the artist?

    • @faanross
      @faanross Před měsícem

      thanks friend. the opening scene wizard is from a game called stone story. i made all the animals looping ascii gifs in AE, my girlfriend made the "explainer" animations. x

    • @f1shh-sec
      @f1shh-sec Před měsícem

      @@faanross awesome, thank you! The videos look so smooth

    • @faanross
      @faanross Před měsícem

      @@f1shh-sec really appreciate that <3

  • @kukatech
    @kukatech Před měsícem

    Well after here, where does it continue? next episode.

  • @mutsumiinakano5798
    @mutsumiinakano5798 Před měsícem

    i try to send from my VM kali to VM Ubuntu, but in Ubuntu, it doesn't have any response. The firewall is working normally

  • @patates1165
    @patates1165 Před měsícem

    very good videos idk how do you have so low subs but you really deserve more. One of the best teaching and editing cyber security videos out there

    • @faanross
      @faanross Před měsícem

      hey patates, thanks for the comment - appreciate it. to be frank this is just a labour of love, i originally started it to help me break into industry and land my first job - it already succeeded in that regard. now i'm just continuing because i genuinely enjoy it, it's a way for me to still practice design, animation etc. so not really chasing views, just getting nice comments like this is more than enough for me. hopefully i'll help a few people along the way. keep well.

  • @TrainSec
    @TrainSec Před měsícem

    Great content.

    • @faanross
      @faanross Před měsícem

      Huge compliment coming from you, appreciate it.

  • @ejzzrhzhesjz
    @ejzzrhzhesjz Před 2 měsíci

    good

  • @cvport8155
    @cvport8155 Před 2 měsíci

    Can you make more advanced techniques red team and evasion

    • @faanross
      @faanross Před 2 měsíci

      sure, anything specific you’re interested in?

    • @cvport8155
      @cvport8155 Před 2 měsíci

      @@faanross defense evasion Powershell obfuscation ....

  • @shd2937
    @shd2937 Před 2 měsíci

    what are those ASCII gif shapes ? where is that from

    • @faanross
      @faanross Před 2 měsíci

      you mean the background animations - skull, jellyfish etc? made them in after effects.

    • @faanross
      @faanross Před 2 měsíci

      also, the backgrounds they are superimposed on are from 'tektronix' - old analog animation.

  • @nwofreez
    @nwofreez Před 2 měsíci

    🔥🔥🫡 Quality content

  • @Robutnikon
    @Robutnikon Před 2 měsíci

    Slick from top to bottom. Great Success! 🔥👌🏻🔥

  • @faanross
    @faanross Před 2 měsíci

    important correction: when i mentioned my process for "massaging" code i mentioned changing function/variable names + comments as examples of things you can do to affect it. thanks to Jason Cage for pointing out this won't actually have any effect since this is all stripped away when compiling. some other changes i made that will (most likely) affect the binary: - changed order of variable declaration - where some variables were first initialized to null and later assigned, i initialized them to eventual value immediately - changed printf statements if you'd like a more comprehensive understanding of exactly what changes i made - generate template with hellshell and compare to my code in description - for a shortcut just ask some LLM to point out all the differences also, you can run DefenderCheck from matterpreter vs the template, it will show you exactly what gets flagged, and then you can work to address it, test again with DefenderCheck.... iterate until you pass muster. apologies on the slip-up, i'm learning with y'all. x

  • @user-yk7rc6fq2k
    @user-yk7rc6fq2k Před 2 měsíci

    Hi, I love your content. Just a question, though. What are the methods to bypass signature detection? Does adding or removing comments and changing variable names and function names work? I heard that doing these won't reflect on the compiled executable since it removes the comments from the binary, etc.

    • @faanross
      @faanross Před 2 měsíci

      hey, thanks appreciate it. this is a great point and you are 100% spot on. i guess i was stuck in C# paradigm where, since it's compiled to CIL, function/variable names are retained. but yeah comments always stripped, not sure what i was thinking perhaps referring to the fact that i changed the printf output. when i "massaged" i also changed order where i could, order of variable declarations, and for example where before initially some of the local variables were initialized to NULL and only assigned later, i just initialized them to their values immediately. my process was somewhat chaotic, i just went through it making changes and retried it, it worked first time, so unsure where the "line" was, but of course you could use defendercheck to ID what part exactly is triggering the detection). hope this helps, obvs feel free to compare the hellshell output to the code i linked above since its pre- and post changes i made. and thanks for pointing this out, i'll pin a correction to top of comments, and will attempt to clarify in a future vid. keep well.

  • @bitwiser4833
    @bitwiser4833 Před 2 měsíci

    quality content, gg

  • @evansosagie1315
    @evansosagie1315 Před 2 měsíci

    Big fan

  • @BG5850
    @BG5850 Před 2 měsíci

    Man your awesome thanks

  • @user-lv1py8zj3i
    @user-lv1py8zj3i Před 2 měsíci

    Next vedio bro

    • @faanross
      @faanross Před 2 měsíci

      Finalizing the script, it’s coming! IPfuscation with HellShell x

    • @user-lv1py8zj3i
      @user-lv1py8zj3i Před 2 měsíci

      Bro develop,a adware ,spyware,a randsomeware plss prepare vedio for me bro?do for me bro

    • @faanross
      @faanross Před 2 měsíci

      @@user-lv1py8zj3i hey bro i'm DEF never ever going to do any adware, scourge of the earth. i'm currently developing an entire course on creating a RAT in C#, it will have keylogging, screen capture etc so will scratch your spyware itch. As for ransomware, it's something i'll eventually get to maybe, my real focus is on what occurs immediately following exploitation. thanks for the suggests.

  • @user-iq3tz8yz4h
    @user-iq3tz8yz4h Před 2 měsíci

    ありがとう faan ross for the wonderful video. I just found your channel. Your style is very fun to watch. meme as well :D I'll watch the rest of your videos soon.🙂

    • @faanross
      @faanross Před 2 měsíci

      thank you friend 🫶🏻

  • @mikeoki7392
    @mikeoki7392 Před 2 měsíci

    HAT OFF SIR. YOU ARE THE BEST. 🙌

  • @SpadeVI
    @SpadeVI Před 2 měsíci

    This is really cool man i appreciate this project this is perfect for beginners

    • @faanross
      @faanross Před 2 měsíci

      thanks amigo, appreciate that

  • @user-fn4qf8nb2t
    @user-fn4qf8nb2t Před 2 měsíci

    You explained that better than my professors man. I would love to see your malware development videos tho!

    • @faanross
      @faanross Před 2 měsíci

      thanks amigo, i appreciate that. i currently have about 5 vids, on my C# payload mastery playlist. also working on a full C# RAT course, probably dropping later this year.

    • @user-fn4qf8nb2t
      @user-fn4qf8nb2t Před 2 měsíci

      @@faanross well I am not familiar with c# but since you explain things clearly I will definitely give it a try.

  • @ohmsohmsohms
    @ohmsohmsohms Před 2 měsíci

    thanks a lot !

  • @wonkafansonly2005
    @wonkafansonly2005 Před 2 měsíci

    I watched this one a few times, so many concepts packed into one video….this was really well done. TBH I thought I understood processes and threads etc but have gained some new understanding thanks to the visuals. In particular the illustration of the threads as data streams was a key unlock. I love getting into the weeds of what is happening, it makes understanding all the other abstractions above it so much more intuitive. Thanks for all the effort that went into making this, your skill at concisely presenting concepts in an engaging and informative way is on full display here. Art is on point as always, props to your gf as well.

    • @faanross
      @faanross Před 2 měsíci

      yeah i spent some time now just fully immersed in the windows basics (well "basics" being quite relative here, perhaps fundamentals is a more apt descriptor) teaching from pavel yosifivich - got all his books and been spending about 2 hrs/day on his pluralsight courses. an absolute G. so much of what i presented here is my distillation/re-representation of his essential lesson on processes. but i do find for me too these things are so abstract and just seep my through my mind less i create some kinda story or narrative. this one was developed walking in forest with my pooch - good time to speak to "myself" since nobody else is around (mostly). as always, really appreciate your feedback. also please feel free if there's ever anything you think i can improve on etc - i'm happy to receive your critique. goal is to +1 with each iteration with the hope of making this as great as it has the potential to be. poco a poco. doing another short theory (or malware development foundations) vid on 'what is process injection', and then back to main C# course for a whole mini-series (within the series) on process injection, hope to touch on some more modern/advanced stuff too in that. have a great week. x

    • @wonkafansonly2005
      @wonkafansonly2005 Před 2 měsíci

      @@faanross oh nice i didnt know he had pluralsight courses, def gonna check those out. If youre open to content suggestions a video on your learning and notetaking strategies would be interesting. As an advanced persistent noob I struggle to find the right balance between taking excessive notes vs useful notes. Everyone says to take detailed notes as you are learning stuff but it feels like it makes the learning process so much slower. I for sure have saved time being able to reference notes from previous but i also have pages and pages of notes I never looked at again. Hard to shake the feeling of always playing "catch up" and so having your learning be optimized is critical yet difficult to achieve.

    • @faanross
      @faanross Před 2 měsíci

      ​@@wonkafansonly2005 yeah def the most affordable way to access his content, and there are 5 new courses there, totaling about 30 hours, dense af so can keep you chewing for some time. dude i TOTALLY feel you on the note-taking thing, it's something i still grapple with tbh but one thing that made a HUGE difference is earlier this year i switched from notion to obsidian. now to be clear there's nothing inherent in obsidian that magically fixes this, but i spent a lot of time then watching obsidian tuts and the imbibing whole PKM/zettelkasten school of thought. i mean that's a rabbit hole that can be a danger in and of itself (the distinction between path and goal becoming blurry), but i did notice that before in notion i was essentially just hoarding notes, and never looking a them. so they were essentially pointless. then i decided instead of copying my notes over from notion (about 2 years worth, so quite a bit), i was just gonna start anew, and make them "living note" - ie consolidate around specific topics and explain them as if to someone. and the intention is to eventually put them on my site (obsidian makes this easy too), so instead of having for example 4 different notes on process injection depending on the resource, i have one master page where i am explaining it as if to someone else. then when i learn something new about process injection, instead of just adding a new note, i'll just find ways to integrate it into my existing notes. anyhoo on my daily note this is my reminder to myself, kinda gets to the gist of it - "seek to understand, rewrite in own words, don't just mindlessly copy. this is not just an info dump to gather dust, but living notes that reflect your own understanding. write ideas down in your own words, not lists of info you can look up in google in a second - 0 point." something else is i used to immediately take detailed notes from the go, now for most things - let's use pavel's video as an example, i'll just watch it through first, staying as mentally engaged as i can. then i'll rewatch, engage (ie do it myself where relevant) and take notes. if i'm gonna take notes, i'm really gonna take them, which is an investment so it also means i'm 99% sure at this point this should be worth taking notes of. meaning i've created more of a system/mindset to be selective of what i take notes of, and then if i do i really make them my own. i'd rather have 10 pages of notes that are a product of my own thinking, than 1000 pages of copied and pasted notes of others. i can go on about this for some time, but yeah i think that mostly encapsulates it. no i'm super happy and grateful for content suggestions, tbh this is an idea that has been floating in the back of my head since i had a similar discussion with someone on x a week or so ago. so thanks for that, and please whenever you feel inspired to share a suggestion i'm very grateful - you are in many ways the most engaged/engaging and articulate viewer i've had to date, so really value your feedback.

  • @wonkafansonly2005
    @wonkafansonly2005 Před 2 měsíci

    I called Jenny and told her no more drugs for that man

    • @faanross
      @faanross Před 2 měsíci

      the "no more drugs for that man" from face/off, ya stumped me on the first part... qui est jenny?

    • @wonkafansonly2005
      @wonkafansonly2005 Před 2 měsíci

      @@faanross famous song with that number in it :) czcams.com/video/6WTdTwcmxyo/video.html

    • @faanross
      @faanross Před 2 měsíci

      oh yeah and was curious is your handle a reference to the office ep 'golden ticket'?

  • @Jamaal_Ahmed
    @Jamaal_Ahmed Před 2 měsíci

    New subscriber , thanks man 🎉 .

    • @faanross
      @faanross Před 2 měsíci

      well thanks to you good sir.

    • @Jamaal_Ahmed
      @Jamaal_Ahmed Před 2 měsíci

      @@faanross bro i have issue , i writed c# script then i build msfvenom in csharp , then when i compile windows defender is detect , can you help me , i can share source code of c# in my github .

    • @faanross
      @faanross Před 2 měsíci

      ​@@Jamaal_Ahmed hey unless you've taken specific actions to avoid defender this is to be expected - you did not do anything wrong. i've not gotten to the point in my course to deal with that, still just setting up fundamentals. so to be able to test and run etc without worrying about defender interfering i recommend: 1. set up a windows VM to do all your testing in 2. run 'windows defender remover' script by ionuttbara, you can find it on github. hope this helps, and don't worry we'll deal with EDR/AV evasion specifically in more depth soon, since this is a beginner course i need to cover intro topics before we can meaningfully discuss that.

    • @Jamaal_Ahmed
      @Jamaal_Ahmed Před 2 měsíci

      @@faanross i got it thank you so much brother .

    • @faanross
      @faanross Před 2 měsíci

      @@Jamaal_Ahmed anytime bro

  • @vladkud7599
    @vladkud7599 Před 2 měsíci

    Hi! I have installed scapy by using a command pip install scapy but when i'm trying to start the code i am getting an error - ModuleNotFoundError: No module named 'scapy' i was trying to search info about it but anything helps maybe u know the cause? thanks!

    • @tomv.5297
      @tomv.5297 Před 2 měsíci

      Maybe run your code in a IDE like PyCharm and go to settings and add 'scapy' in 'python interpreter'?

  • @wonkafansonly2005
    @wonkafansonly2005 Před 3 měsíci

    “a moment of realization is worth a thousand prayers” :) Another dank chapter in this great series! Really enjoyed how you did the cryptography overview and also covering the “why” of different topics. The visuals really help to build a mental model of what is going on that transcends simple understanding of syntax. Killer art as always!

    • @faanross
      @faanross Před 3 měsíci

      man i just appreciate your comments so much, on so many levels. like you gets it, fr. have my gf to thank for the new visuals, she's digging it and will be more involved, gonna put more emphasis on that. yeah the visual id is coming together, i look fwd to evolve it further. next vid in motion tomorrow, hope to publish by eow. keep well fren. x

    • @wonkafansonly2005
      @wonkafansonly2005 Před 2 měsíci

      @@faanross appreciate you too my friend. looking forward to the next one!

    • @faanross
      @faanross Před 2 měsíci

      @@wonkafansonly2005 awesome amigo. we're a few days away from publication, trying something a little different and included a lot of new animation. have a lovely day. x

  • @The_Mad_Arab
    @The_Mad_Arab Před 3 měsíci

    Thank you for your videos this is exactly what I was looking for!

    • @faanross
      @faanross Před 3 měsíci

      cool man glad you found it useful, i saw you commenting on the other video re: scapy, but the message seems to be gone, not sure if it's a glitch or you deleted it lmk if you need help there.

  • @Cert_Study
    @Cert_Study Před 3 měsíci

    This is so awesome. This is the stuff I’d love to do in cyber security or cloud.

  • @ohmsohmsohms
    @ohmsohmsohms Před 3 měsíci

    im ngl bro i love you i deadass decided the programming language i'll learn is c# and i wanted to use it for red teaming. ur vids are going to help me a ton!

    • @faanross
      @faanross Před 3 měsíci

      yooooo - thanks for the epic comment brother <3 appreciate it. C# is a great choice to cover your OOP/high-level base if you're gonna attack windows. also a great vehicle to get going in windows maldev, it's very "plug and play". would also suggest learning at same time, or shortly after, C/C++ for lower level stuff. they compliment one another, and i actually find learning both at the same time and comparing them helps me learn each individually. LOTS of overlap in any case, for example here in this code we're using a lot of unmanaged (aka C/C++) functions already. but yeah having a solid C base is really imperative, i chose C# for this course because 99% of the training out there features C already so i wanted to bring something new to the table. and like i said - it's an awesome tool for the toolbox if you're gonna be attacking windows. keep well bro.

  • @Robutnikon
    @Robutnikon Před 3 měsíci

    Your vids are 🔥🔥

    • @faanross
      @faanross Před 3 měsíci

      thanks - been noticing all your enthusiastic comments, appreciate it! happy haxorcizin' bruh!

  • @theman-mo9er
    @theman-mo9er Před 3 měsíci

    windows defender is my enemy

    • @faanross
      @faanross Před 3 měsíci

      together, we shall overcome 🫡

    • @theman-mo9er
      @theman-mo9er Před 3 měsíci

      @@faanross I will eventually get a meterpreter past it haha

    • @faanross
      @faanross Před 3 měsíci

      @@theman-mo9er godspeed.

    • @theman-mo9er
      @theman-mo9er Před 3 měsíci

      @@faanross yo i got a meterpreter and a havoc listener past defender! thanks man

    • @faanross
      @faanross Před 3 měsíci

      @@theman-mo9er nice bruh, let me know when the course is dropping i wanna attend

  • @user-wp5en1lt8r
    @user-wp5en1lt8r Před 3 měsíci

    is it just me who forgot last videos lessons and have to go rewatch again ??? any way to stop forgetting or is it normal in cyber

    • @wonkafansonly2005
      @wonkafansonly2005 Před 3 měsíci

      totally normal, key skills to develop are note-taking, commenting code, and knowing where to look to find information when you are stuck. Different things will click the more you do stuff but there will always be a component of forgetting and circling back to things you have already learned. IMO feeling discouraged, stupid, and overwhelmed at times is all part of it. Imagine you are a mountain climber, it never gets "easy" but you can get skilled enough to climb any mountain you choose and go where others cannot :)

    • @faanross
      @faanross Před 3 měsíci

      @@wonkafansonly2005 epic response dude.

    • @faanross
      @faanross Před 3 měsíci

      yooooo, no it's SUPER normal lol. the above advice is excellent, i would add: - don't just do tutorials, obvs watch them, follow along but then also "make them your own". look at my code, how can you improve things, or perhaps change things - find out what other encryption standards there are and change from say AES to RC4. just get involved - it will allow you to look at the material in another, "deeper" way. i always look at any lesson and ask questions, make changes, tinker and see what results. it's just going from consumption to expression, it helps a lot to develop insight. - and then tbh i would say, and you can't do this for everything because it's too time consuming, but find the things you REALLY want to lock in and teach it. this has becoming trendy known as the "feynman technique", popularized by the author of a book called "ultralearning", though apparently feynman himself never really articulated it as such. but just the simple idea in that when you explain something to someone you'll really discover where your knowledge breaks down, and then you can go ahead, fill in those gaps and create a cohesive mental model. so whether you give a lecture to an imaginary person, write essays, or create videos, just force yourself to explain it. this is one of the main reasons why i create these videos - by the time i've published this video i've not only researched multiple sources, but i've thought about it, re-articulated it in my own words, and probably gone through the ideas 5 - 7 times. and tbh dude even then i sometimes have to refer back to my old videos to remember things lol. so no it's totally par for the course, there are probably some special "rain main-esque" people out there that can read stuff and remember it instantly, but i'm a decidedly average person. but the thing is - i really love this, so learning, forgetting, re-learning - this is just a fun adventure for me. progress is painful and slow, but as long as you're intrinsically motivated it's really all gravy. thanks for the comment and keep well.

  • @BigG9982
    @BigG9982 Před 3 měsíci

    brooooooooooo love you man thanks i watch it later its 3am now need to sleep. thansk for your nice work for us !!!👍

  • @ammaarahadjiet7967
    @ammaarahadjiet7967 Před 3 měsíci

    Brilliant editing and video overall, you made it look so easy 😢I’m a complete noob, so if you don’t mind me asking - why are we using gitgud and lobo? Why can I not run this code on something like replit?

  • @user-vn3gb3bb7u
    @user-vn3gb3bb7u Před 3 měsíci

    I make a pyton cyberscururty