When John says "I know this video is already getting long" and you are like "huh? keep going cause this is really interesting" Dont cut your videos short because you think we might be getting bored. This is awesome stuff! I would LOVE to see a longer video on this. Im a red teamer so building custom malware is something I really want to start playing with.
@@stevelin3659 The sudden switch to the first person tells me you've been through that a bunch of times before... [EDIT]: And yes, none of the projects I'm currently working on _are_ easy, even though I started them thinking they _would_ be.
Its things like this that got me into computers as a child in the 80s. There was like this secret world of PCs that the casual user never would experience. Whether it was just pirating software or hacking into networks it made you feel like absolutely anything is possible you just had to acquire the knowledge for it. Even to this day with how streamlined the modern PC experience is there is still a hidden world filled with programs and operations that even a well versed daily PC user has no clue they exist and I absolutely love it!
same bro.. my first pc ran DOS, and my class had two apple IIe's.. meaning i have never liked windows, learned to program in BASIC. i guess some folks like being sandboxed in by their OS under the guise of "security", but everyone should have the option to take control of their PC
Even thought the creators of the language said in their forum "please don't create malware with Nim" ... thanks for the video. It's nice when the language gets some attention. It is very nice, especially for the people who love Python.
Dude I love your content. You go very deep with basic language that takes me step by step. Good job and keep up the hard work :). Just want to ask you, why don't you make videos about cloud security. I know it is a massive topic, and I would love watching more about it, especially from you.
Any language than can be compiled into native executable (with relatively smallish runtime) will be used to write malwares. In the past: asm, C/C++, delphi. Now what: go, rust, nim, D?
Writing malware is easy. In an airgapped network, deploy AV, EDR, and IPS+IDS to a couple of VMs and at a gateway. That takes maybe 1 day. Now you have a lab. Write custom malware, deploy, and see what gets caught. Don't even need to be complicated malware, just basic functions that do what you want it to do. Now, be creative in how you obfuscate its code and operations. Live off the land. On one red team, I got Mimikatz to slip right past their EDR simply by prefixing the PowerShell with 200 MB of comments. It's too large to analyze, so the EDR didn't bother. A few months ago, I got a basic reverse shell to work by having the code hide itself in new LNK files that pulled the rest of the code from environment variables.
I’ve been studying exploit dev for the last month or so, I already have programming experience and work in cyber. I picked up Maldev Academy yesterday, and feel like it is going to give me a years worth of experience in just a couple weeks by how in-depth it is. It’s expensive, but I justified the cost by thinking about how many hours I’d spend researching to find all of the same info. The framework they give you for learning maldev is amazing.
how much is it ? and can you get ur money back if u find it worthless..so many companies claim that they are the best, then when u pay for a subscription, it SUCKS
@@rxtechandtrading lifetime access is $499, with Johns discount code it was $450. IMO I think it's very good. Like I said in my comment above, you can find all of the info from doing your own research, but the time save this gives is worth it.
Hey any idea how hackers bypass 2FA in facebook. How they get the code or do something else? I had 2FA in fb was hacked. Fb has no customer support either. Wondering if ya have any idea. Thanks.
@@anupkarki8237 I think it has something to do with a technique called CSF -client side forgery request -but there is some phishing involved with that i believe-you essentially need the token or session cookie of another authenticated user -if that is what u r trying to do
I'm not a fan of malware (for obvious reasons), but if people will start learning Nim because of it, maybe they will see all that's good about Nim outside of it's offensive application. Good Video, as usual.
@@scootergirl3662 when I was younger I was into all things strategic warfare, biological warfare, WMD, stuff like that... it got to a point where I had downloaded every piece of literature that places like think tanks working for the US government, Janes, Los Alamos Laboratories and that famous Russian Biopreparat scientist defector allowed to leak in the public domain(I am not from the States but we are allied close enough that I still thank my lucky stars for not ending up in Guantanamo...)... I don't know why others study malware but I just love me some forced complex system disassembly... a string of code bringing a whole system down? I get off on that!!! I also once cried when I accidentally suffocated a praying mantis I had caught in a jar... holes in the lid, y'all... holes in the lid...
I have been wanting to learn NIM for a while. I might try to use it for my upcoming OSEP (I know that they want me to use python and C# but I don't think it matters.).
This is a nice video on how to read code manuals. A big thing I wish I was taught earlier is how to not rely on examples of code and be able to know what to do from the manuals.
on linux you can type --help after any command to get some help/optional switches/examples.. or put "man" before the command to see the full manual.. i copy the important stuff to the mousepad so i can refer back to it easily
First: do not use common required APIs, use something exotic that does same work. Make malware work slowly, do not trigger suspicious behavior. All that usual stuff is tracked by AV software, so do not use it. Use some zero day exploit, do not mass stuff, do slow polymorphic or metamorphic code encryption. But best way: if you can do all of it find legal job, get money there.
Seeing from the comments I can see anybody has no idea how to evade anti viruses really. So here is a hint Obfuscation is the key... we encrypt the strings compress them... And Change methods name into random string arrays, adding dummy codes, masking data... etc. Thats the most basic. The advanced obfuscation requires subjects like anti debug and anti tampering the most important of all inventing your own compression algorithms...
If I write a good App, it feels good to know it's out there providing values to end users. If I spend same amount of time writing a piece of malware, then it gets patched, as if never existed, it'll be feelsbadman. So, I don't know... Cool knowledge though.
lol, I don't know why but hearing anyone talk about this stuff (MalDev) enthusiastically from _this_ perspective is funny to me. I've learned all those things over the years for completely different reasons, in modifying games I encounter lots of stupid anti-debug tricks and have to learn the same craft as malware authors to circumvent the anti-debug surrounding a lot of games DRM. I don't even have any interest in pirating games, but that shit gets in the way 😕
Hey man, Can you suggest/make some videos on how decompilation to assembly/key activation (and protections against this) work? It's a topic I've always found interesting, but pretty hard to make headway with, despite being an engineer myself.
FR: Bonjour... oui... la police... c'est pour signaler un homme ! Qu'a-t-il fait ? C'est un hacker ! 0_ 0 EN: Hello... yes... police... this is to report a man ! What did he do ? It's a hacker ! 0_ 0
make android notepad. ask all permission. read contacts sms gallery send internet to your server. user installed accept all permissions even notepad not need
@ayyleeuz4892 I know how to put malicious code at code cave of the PE files but what after that? I want to learn, can you suggest me some good resources?
@@snehbavarva8383I may suggest you to just stop writing malware - it will get you in a lot of trouble (and it got me too), but if you still want to - just don't talk about it on internet
In my opinion anybody who is writing malicious code for the purpose of distributing, misleading and/or causing harm, should be considered and tried as a terrorist and do at least 25 to life prison sentence.
Never said "Don't try this at home" or "Only for educational purposes". My hero.
My father
My daddy
my sperm donor
@@timelessnesses nonono, hes OURS
@@opus_Xuwu
When John says "I know this video is already getting long" and you are like "huh? keep going cause this is really interesting"
Dont cut your videos short because you think we might be getting bored. This is awesome stuff! I would LOVE to see a longer video on this. Im a red teamer so building custom malware is something I really want to start playing with.
I somehow always get motivated to program my own projects when watching your videos XD
its because you think it will be as easy as watching him do it , thats just how i feel
@@kent0n144very true😢
Programmers do things not because it’s easy, but because we think it would be easy.
@@stevelin3659
The sudden switch to the first person tells me you've been through that a bunch of times before...
[EDIT]: And yes, none of the projects I'm currently working on _are_ easy, even though I started them thinking they _would_ be.
Its things like this that got me into computers as a child in the 80s. There was like this secret world of PCs that the casual user never would experience. Whether it was just pirating software or hacking into networks it made you feel like absolutely anything is possible you just had to acquire the knowledge for it. Even to this day with how streamlined the modern PC experience is there is still a hidden world filled with programs and operations that even a well versed daily PC user has no clue they exist and I absolutely love it!
same bro.. my first pc ran DOS, and my class had two apple IIe's.. meaning i have never liked windows, learned to program in BASIC. i guess some folks like being sandboxed in by their OS under the guise of "security", but everyone should have the option to take control of their PC
Even thought the creators of the language said in their forum "please don't create malware with Nim" ... thanks for the video. It's nice when the language gets some attention. It is very nice, especially for the people who love Python.
I love how Ed Sheeran is teaching me how to write a malware lol
😂😂
On point.
😂😂you make my day
Whenever I read shit like this I cringe at how often the receiving person must get this joke, like when ultrasound techs hear "is it a boy or a girl?"
@@jg2283 you're not alone brotha 😭💀
Dude I love your content. You go very deep with basic language that takes me step by step. Good job and keep up the hard work :).
Just want to ask you, why don't you make videos about cloud security. I know it is a massive topic, and I would love watching more about it, especially from you.
Awesome video, man! Keep up the great work :)
🎉
Waiting for your malware development part 3 lol
Keep it up too, really like ur Videos!
crow what are u doing here bro
Finally, Nim will be shone into light. Great video, even though Nim don't endourse making malware with it 😂
Any language than can be compiled into native executable (with relatively smallish runtime) will be used to write malwares. In the past: asm, C/C++, delphi. Now what: go, rust, nim, D?
too late!! xD
Dude, I like how you cover so much material in such a efficient time, I really appreciate it!
I was about to skip the ad but stuck around when I heard the names. That looks like a solid platform.
Writing malware is easy. In an airgapped network, deploy AV, EDR, and IPS+IDS to a couple of VMs and at a gateway. That takes maybe 1 day. Now you have a lab. Write custom malware, deploy, and see what gets caught. Don't even need to be complicated malware, just basic functions that do what you want it to do. Now, be creative in how you obfuscate its code and operations. Live off the land. On one red team, I got Mimikatz to slip right past their EDR simply by prefixing the PowerShell with 200 MB of comments. It's too large to analyze, so the EDR didn't bother. A few months ago, I got a basic reverse shell to work by having the code hide itself in new LNK files that pulled the rest of the code from environment variables.
Parsing junk to files to bypass AV is such a funny thing to see work. So trivial to do as well!
"GPT4 please explain this like if I was 5 years old"
I’ve been studying exploit dev for the last month or so, I already have programming experience and work in cyber. I picked up Maldev Academy yesterday, and feel like it is going to give me a years worth of experience in just a couple weeks by how in-depth it is. It’s expensive, but I justified the cost by thinking about how many hours I’d spend researching to find all of the same info. The framework they give you for learning maldev is amazing.
how much is it ? and can you get ur money back if u find it worthless..so many companies claim that they are the best, then when u pay for a subscription, it SUCKS
@@rxtechandtrading lifetime access is $499, with Johns discount code it was $450. IMO I think it's very good. Like I said in my comment above, you can find all of the info from doing your own research, but the time save this gives is worth it.
Hey any idea how hackers bypass 2FA in facebook. How they get the code or do something else? I had 2FA in fb was hacked. Fb has no customer support either. Wondering if ya have any idea. Thanks.
@@anupkarki8237 I think it has something to do with a technique called CSF -client side forgery request -but there is some phishing involved with that i believe-you essentially need the token or session cookie of another authenticated user -if that is what u r trying to do
@@rxtechandtradingfrom what I know, you’d be very lucky to find Facebook allowing CSRF on any of their pages
I wish you could create a series of Nim focused on offensive and defensive tools.
0:34 no!
@@ligiat134xplain
I'm not a fan of malware (for obvious reasons), but if people will start learning Nim because of it, maybe they will see all that's good about Nim outside of it's offensive application. Good Video, as usual.
The point of learning to write malware is to better understand how to identify and protect against it, at least from a ethical hacking perspective
@@scootergirl3662 when I was younger I was into all things strategic warfare, biological warfare, WMD, stuff like that... it got to a point where I had downloaded every piece of literature that places like think tanks working for the US government, Janes, Los Alamos Laboratories and that famous Russian Biopreparat scientist defector allowed to leak in the public domain(I am not from the States but we are allied close enough that I still thank my lucky stars for not ending up in Guantanamo...)...
I don't know why others study malware but I just love me some forced complex system disassembly... a string of code bringing a whole system down? I get off on that!!!
I also once cried when I accidentally suffocated a praying mantis I had caught in a jar... holes in the lid, y'all... holes in the lid...
@scootergirl3662 that's what i thought he was gonna do but ok.
This is my first time hearing about this nim it’s syntax looks a little similar to python, tnx for this interesting tutorial
Nim is such a great language! The syntax of Python and the speed of C
I have been wanting to learn NIM for a while. I might try to use it for my upcoming OSEP (I know that they want me to use python and C# but I don't think it matters.).
When I learn a new programming language I write "What's up bitches?!" Instead of "Hello World."
This is a nice video on how to read code manuals. A big thing I wish I was taught earlier is how to not rely on examples of code and be able to know what to do from the manuals.
on linux you can type --help after any command to get some help/optional switches/examples.. or put "man" before the command to see the full manual.. i copy the important stuff to the mousepad so i can refer back to it easily
Was waiting for this to be posted.
Not watching to learn how to do but to understand how it’s done 😌
First: do not use common required APIs, use something exotic that does same work. Make malware work slowly, do not trigger suspicious behavior. All that usual stuff is tracked by AV software, so do not use it. Use some zero day exploit, do not mass stuff, do slow polymorphic or metamorphic code encryption. But best way: if you can do all of it find legal job, get money there.
Thanks John, great video👍!
I just love the Nim language.
with a thumbnail like that who could resist clicking 🙃
That was very technical, but interesting video!
This is what a hero looks like
A malware for many is a goodware for someone else :D
Hey big fan of yo man (Cyber Security Student)
nice tutotorials, i think john ippsec trix are the best in our era.
who's trix .??
Hey Johny ! I like that the way you teach something, you Rock dude 🤘
John you’re the man!!!!!
Am I the only one who think John needs to do a tutorial series on Sublime text? 😂
Him: we gonna see how we can write malware
Me: print("malware")
thanks man. liked a lot.
good job john keep it up. i love you
Seeing from the comments I can see anybody has no idea how to evade anti viruses really. So here is a hint Obfuscation is the key... we encrypt the strings compress them... And Change methods name into random string arrays, adding dummy codes, masking data... etc. Thats the most basic. The advanced obfuscation requires subjects like anti debug and anti tampering the most important of all inventing your own compression algorithms...
If I write a good App, it feels good to know it's out there providing values to end users. If I spend same amount of time writing a piece of malware, then it gets patched, as if never existed, it'll be feelsbadman. So, I don't know... Cool knowledge though.
Once it's patched just leak the source code and let everyone run rampant with it. Like RAASNet, Zeus/zbot, apfell, etc.
Also being patched doesn't mean much lol. I've seen Server 2008 R2 in production as recently as 2023.
Maldev Academy is quite exoensive
I am so excited to check out MalDev, thanks for sharing your thoughts on it!
Can you give me your thoughts about MalDev when you take it, I’m so curious
i wonder if anti-social people actually writes "Hello World!" or if they write "Just you wait motherfuckers...."
Nim is a new programming language for me, but maybe i should check that.
Great video.
Please make more Nim content
What’s the limit of this applications applicability? How can you use this method to install data gathering, keystroke loggers, and zombies?
dang, just paid for maldev academy after seeing your tweet, 2 days before this 10% off dropped 🤦
How it the course work for maldev?
really want to finish OSEP so i can start modernising my tradecraft with nim, I really don't like Visual Studio + CSharp
Thanks for this.
lol, I don't know why but hearing anyone talk about this stuff (MalDev) enthusiastically from _this_ perspective is funny to me.
I've learned all those things over the years for completely different reasons, in modifying games I encounter lots of stupid anti-debug tricks and have to learn the same craft as malware authors to circumvent the anti-debug surrounding a lot of games DRM. I don't even have any interest in pirating games, but that shit gets in the way 😕
To be honest a bit costly if you see the life time plan if compared with TCM Malware analysis course... Not complaining about the course content.
You against the Chinese. Need you 😊
Okay, Why?
Nice information.
Hey man,
Can you suggest/make some videos on how decompilation to assembly/key activation (and protections against this) work?
It's a topic I've always found interesting, but pretty hard to make headway with, despite being an engineer myself.
Not sure how current it still is, but there is a book called Practical Malware Analysis that you might like, comes with code examples etc...
@@TheodoreWard Thanks. I'll check that out!
Hey John, we want a malware development playlist from you.
Hello brother, greetings from Argentina.
golang vs rust, for pentesting or red team?
12:38 isnt NULL = 0? Correct me if i'm wrong but i think that NULL is just 0
Sliver only works up until i try generate the listener then it just endlessly compiles
John that service is over $200 dollars! I still am looking for work since Aug. 02.
No matter what anybody says, videos about hacking/pentesting are always going to be used maliciously, and the knowledge is going to be exploited.
What’s the best way to become an ethical hacker? I have no IT background.
Make a full vedio on NIM language full course complete ✅
just increase the file size of the infected program goes undetected every time. on all windows based systems
FR: Bonjour... oui... la police... c'est pour signaler un homme ! Qu'a-t-il fait ? C'est un hacker ! 0_ 0
EN: Hello... yes... police... this is to report a man ! What did he do ? It's a hacker ! 0_ 0
Modern technology of Nobita, bit understanding
i tried the same program in linux but got the error "execution of an external program failed: gcc -o......."
I run nim c runner.nim
Off topic but are you using a type 1 hypervisor ? if so which one ? cause that windows vm is more performant than my native install
when u hack can you skip steps or do u have to start in order? very confusing stuff i want to learn but damn
how many will learn to make malware for your computer?
How are you guys able to subscribe to academies like maldev
what is he using for the terminal autofill?
So would this be a Trojan?
More explain
Bing
Medal
How to time job joining
amazing video
use c/c++
@@sumitsangrampurkar8558c/c++ was designed to sit like right on top of registers. Any extensive low level projects should be done in c/c++ imo.
Step 1.) Learn voltage manipulation
love the idea of maldevacademy, but starting at 250$ is a bit XD
After heavily squinting my eyes I wanna tell you that that microsoft doc site has a dark theme when you scroll to the very bottom, on the left side
This is a cool video and nice to see, but I'd much rather it have been done in C or C++
I feel like my fbi agent is watching me since the moment I clicked this video😂😂
In Iran we should work 2 or 3 month for achieving 250$ for starter plan of maldev academy. sadly.
Brutal Economypill
do more of these vedios
I have made a couple pieces of "EDUCATIONAL USE" Malware on Android and Windows. I try to make funny malware.
I'm at if nothing on the internet can be trusted, I'm currently using a disposable phone anyway.
make android notepad. ask all permission. read contacts sms gallery send internet to your server. user installed accept all permissions even notepad not need
is this live ?
hi john, how long is the code valid until?
If this is allowed here, it's bc newest antimalware solution can detect it.
i didn't write hello world in my life,, i always write Test1
NimGang!
Are most malwares made for Windows environment?
Yes
I have one question Why Nim ? Does this language have any special qualities ?
Thank you Seth Rogan
Used to make malware like this in 3 seconds with scripts lol, wonder if its still possible
What? How?
I am thinking to make a malware which will store at code cave of PE file and i want a shell from that victim pc
How can I do that?
@ayyleeuz4892 that’s why I’m asking. I had started my new journey with maldev about 3-4 days ago and i want to learn that’s why I’m asking
@ayyleeuz4892 I know how to put malicious code at code cave of the PE files but what after that?
I want to learn, can you suggest me some good resources?
@@snehbavarva8383I may suggest you to just stop writing malware - it will get you in a lot of trouble (and it got me too), but if you still want to - just don't talk about it on internet
@@geckwwolmfao what there's nothing illegal about writing malware, the issues come in when you run it on machines that aren't your own
is it better to buy the course of sektor7 or maldev (or both)?
you are so fast man
In my opinion anybody who is writing malicious code for the purpose of distributing, misleading and/or causing harm, should be considered and tried as a terrorist and do at least 25 to life prison sentence.
WHAT I NEED TO LEARN TO UNDERSTAND THAT ? THX FOR THE VIDEO
can i see the initial script to see the code
Have discount for a brasilian? Dollar is to much expensive