[RRE 2: C2 Boogaloo] Writing Malware Command and Control Software!
Channel:
Subscribers:
8,430
Published on ● Video Link: https://www.youtube.com/watch?v=eRnXWpRnGQI
In this (incredibly late) addition to the Reverse-Reverse Engineering (RRE) series, I write a hacked up Command and Control (C2) server that stores victim information for later use. Mostly, it's just me hating the hell that C++ puts you through to do the simplest of tasks.
NOTE: If the beginning is too basic, I totally understand. You can skip to 4:00 for more in depth, technical info. I want this series to be for everybody!
Episode One: https://youtu.be/LuUhox_C5yg
--
Patreon: https://www.patreon.com/Viking_Sec
--
**KIT**
My camera: https://amzn.to/2NcU0TU
My mic: https://amzn.to/2QE94wc
**MUST READS**
Practical Malware Analysis: https://amzn.to/2s6Rp6e
Windows Internals: https://amzn.to/2PphxkN
#malware #development
Other Videos By Mitch Edwards (@valhalla_dev)
Tags:
hacking
malware
malware analysis
c++
c programming
development
vlog
devlog
dev log
dev vlog
security
cyber
cyber security
developing malware
malware development
develop malware
how to
tutorial
a day in the life
day in the life
oscp
offense
offensive security
hacker
how to be a hacker
how to develop malware
how develop malware
hackers
how to hack
python
python3
python malware
c2
command and control
malware c2
python 3
sockets
socket programming
networking