[RRE 2: C2 Boogaloo] Writing Malware Command and Control Software!

Subscribers:
8,430
Published on ● Video Link: https://www.youtube.com/watch?v=eRnXWpRnGQI



Category:
Guide
Duration: 7:07
2,583 views
72


In this (incredibly late) addition to the Reverse-Reverse Engineering (RRE) series, I write a hacked up Command and Control (C2) server that stores victim information for later use. Mostly, it's just me hating the hell that C++ puts you through to do the simplest of tasks.

NOTE: If the beginning is too basic, I totally understand. You can skip to 4:00 for more in depth, technical info. I want this series to be for everybody!

Episode One: https://youtu.be/LuUhox_C5yg

--
Patreon: https://www.patreon.com/Viking_Sec
--

**KIT**
My camera: https://amzn.to/2NcU0TU
My mic: https://amzn.to/2QE94wc


**MUST READS**
Practical Malware Analysis: https://amzn.to/2s6Rp6e
Windows Internals: https://amzn.to/2PphxkN

#malware #development







Tags:
hacking
malware
malware analysis
c++
c programming
development
vlog
devlog
dev log
dev vlog
security
cyber
cyber security
developing malware
malware development
develop malware
how to
tutorial
a day in the life
day in the life
oscp
offense
offensive security
hacker
how to be a hacker
how to develop malware
how develop malware
hackers
how to hack
python
python3
python malware
c2
command and control
malware c2
python 3
sockets
socket programming
networking