Part 3 – Abuse System Design and Red Team Tips
In this section, you will learn multiple techniques commonly used by APT malware in the wild. We will cover techniques to convert EXE directly to Shellcode (PE To Shellcode), Executable Compression, get malware signatures, and tips on bypassing UAC protection and elevating privileges.
This section has the following chapters:
- Chapter 7, PE to Shellcode – Transforming PE Files into Shellcode
- Chapter 8, Software Packer Design
- Chapter 9, Digital Signature – Authenticode Verification
- Chapter 10, Reversing User Account Control and Bypassing Tricks