When John says "I know this video is already getting long" and you are like "huh? keep going cause this is really interesting" Dont cut your videos short because you think we might be getting bored. This is awesome stuff! I would LOVE to see a longer video on this. Im a red teamer so building custom malware is something I really want to start playing with.
@@stevelin3659 The sudden switch to the first person tells me you've been through that a bunch of times before... [EDIT]: And yes, none of the projects I'm currently working on _are_ easy, even though I started them thinking they _would_ be.
Its things like this that got me into computers as a child in the 80s. There was like this secret world of PCs that the casual user never would experience. Whether it was just pirating software or hacking into networks it made you feel like absolutely anything is possible you just had to acquire the knowledge for it. Even to this day with how streamlined the modern PC experience is there is still a hidden world filled with programs and operations that even a well versed daily PC user has no clue they exist and I absolutely love it!
same bro.. my first pc ran DOS, and my class had two apple IIe's.. meaning i have never liked windows, learned to program in BASIC. i guess some folks like being sandboxed in by their OS under the guise of "security", but everyone should have the option to take control of their PC
Even thought the creators of the language said in their forum "please don't create malware with Nim" ... thanks for the video. It's nice when the language gets some attention. It is very nice, especially for the people who love Python.
Any language than can be compiled into native executable (with relatively smallish runtime) will be used to write malwares. In the past: asm, C/C++, delphi. Now what: go, rust, nim, D?
Writing malware is easy. In an airgapped network, deploy AV, EDR, and IPS+IDS to a couple of VMs and at a gateway. That takes maybe 1 day. Now you have a lab. Write custom malware, deploy, and see what gets caught. Don't even need to be complicated malware, just basic functions that do what you want it to do. Now, be creative in how you obfuscate its code and operations. Live off the land. On one red team, I got Mimikatz to slip right past their EDR simply by prefixing the PowerShell with 200 MB of comments. It's too large to analyze, so the EDR didn't bother. A few months ago, I got a basic reverse shell to work by having the code hide itself in new LNK files that pulled the rest of the code from environment variables.
Dude I love your content. You go very deep with basic language that takes me step by step. Good job and keep up the hard work :). Just want to ask you, why don't you make videos about cloud security. I know it is a massive topic, and I would love watching more about it, especially from you.
I’ve been studying exploit dev for the last month or so, I already have programming experience and work in cyber. I picked up Maldev Academy yesterday, and feel like it is going to give me a years worth of experience in just a couple weeks by how in-depth it is. It’s expensive, but I justified the cost by thinking about how many hours I’d spend researching to find all of the same info. The framework they give you for learning maldev is amazing.
how much is it ? and can you get ur money back if u find it worthless..so many companies claim that they are the best, then when u pay for a subscription, it SUCKS
@@rxtechandtrading lifetime access is $499, with Johns discount code it was $450. IMO I think it's very good. Like I said in my comment above, you can find all of the info from doing your own research, but the time save this gives is worth it.
Hey any idea how hackers bypass 2FA in facebook. How they get the code or do something else? I had 2FA in fb was hacked. Fb has no customer support either. Wondering if ya have any idea. Thanks.
@@anupkarki8237 I think it has something to do with a technique called CSF -client side forgery request -but there is some phishing involved with that i believe-you essentially need the token or session cookie of another authenticated user -if that is what u r trying to do
This is a nice video on how to read code manuals. A big thing I wish I was taught earlier is how to not rely on examples of code and be able to know what to do from the manuals.
on linux you can type --help after any command to get some help/optional switches/examples.. or put "man" before the command to see the full manual.. i copy the important stuff to the mousepad so i can refer back to it easily
I have been wanting to learn NIM for a while. I might try to use it for my upcoming OSEP (I know that they want me to use python and C# but I don't think it matters.).
I'm not a fan of malware (for obvious reasons), but if people will start learning Nim because of it, maybe they will see all that's good about Nim outside of it's offensive application. Good Video, as usual.
@@scootergirl3662 when I was younger I was into all things strategic warfare, biological warfare, WMD, stuff like that... it got to a point where I had downloaded every piece of literature that places like think tanks working for the US government, Janes, Los Alamos Laboratories and that famous Russian Biopreparat scientist defector allowed to leak in the public domain(I am not from the States but we are allied close enough that I still thank my lucky stars for not ending up in Guantanamo...)... I don't know why others study malware but I just love me some forced complex system disassembly... a string of code bringing a whole system down? I get off on that!!! I also once cried when I accidentally suffocated a praying mantis I had caught in a jar... holes in the lid, y'all... holes in the lid...
First: do not use common required APIs, use something exotic that does same work. Make malware work slowly, do not trigger suspicious behavior. All that usual stuff is tracked by AV software, so do not use it. Use some zero day exploit, do not mass stuff, do slow polymorphic or metamorphic code encryption. But best way: if you can do all of it find legal job, get money there.
Seeing from the comments I can see anybody has no idea how to evade anti viruses really. So here is a hint Obfuscation is the key... we encrypt the strings compress them... And Change methods name into random string arrays, adding dummy codes, masking data... etc. Thats the most basic. The advanced obfuscation requires subjects like anti debug and anti tampering the most important of all inventing your own compression algorithms...
If I write a good App, it feels good to know it's out there providing values to end users. If I spend same amount of time writing a piece of malware, then it gets patched, as if never existed, it'll be feelsbadman. So, I don't know... Cool knowledge though.
lol, I don't know why but hearing anyone talk about this stuff (MalDev) enthusiastically from _this_ perspective is funny to me. I've learned all those things over the years for completely different reasons, in modifying games I encounter lots of stupid anti-debug tricks and have to learn the same craft as malware authors to circumvent the anti-debug surrounding a lot of games DRM. I don't even have any interest in pirating games, but that shit gets in the way 😕
make android notepad. ask all permission. read contacts sms gallery send internet to your server. user installed accept all permissions even notepad not need
FR: Bonjour... oui... la police... c'est pour signaler un homme ! Qu'a-t-il fait ? C'est un hacker ! 0_ 0 EN: Hello... yes... police... this is to report a man ! What did he do ? It's a hacker ! 0_ 0
Hey man, Can you suggest/make some videos on how decompilation to assembly/key activation (and protections against this) work? It's a topic I've always found interesting, but pretty hard to make headway with, despite being an engineer myself.
In my opinion anybody who is writing malicious code for the purpose of distributing, misleading and/or causing harm, should be considered and tried as a terrorist and do at least 25 to life prison sentence.
@ayyleeuz4892 I know how to put malicious code at code cave of the PE files but what after that? I want to learn, can you suggest me some good resources?
@@snehbavarva8383I may suggest you to just stop writing malware - it will get you in a lot of trouble (and it got me too), but if you still want to - just don't talk about it on internet
Never said "Don't try this at home" or "Only for educational purposes". My hero.
My father
My daddy
my sperm donor
@@timelessnesses nonono, hes OURS
@@opus_Xuwu
When John says "I know this video is already getting long" and you are like "huh? keep going cause this is really interesting"
Dont cut your videos short because you think we might be getting bored. This is awesome stuff! I would LOVE to see a longer video on this. Im a red teamer so building custom malware is something I really want to start playing with.
I somehow always get motivated to program my own projects when watching your videos XD
its because you think it will be as easy as watching him do it , thats just how i feel
@@kent0n144very true😢
Programmers do things not because it’s easy, but because we think it would be easy.
@@stevelin3659
The sudden switch to the first person tells me you've been through that a bunch of times before...
[EDIT]: And yes, none of the projects I'm currently working on _are_ easy, even though I started them thinking they _would_ be.
Its things like this that got me into computers as a child in the 80s. There was like this secret world of PCs that the casual user never would experience. Whether it was just pirating software or hacking into networks it made you feel like absolutely anything is possible you just had to acquire the knowledge for it. Even to this day with how streamlined the modern PC experience is there is still a hidden world filled with programs and operations that even a well versed daily PC user has no clue they exist and I absolutely love it!
same bro.. my first pc ran DOS, and my class had two apple IIe's.. meaning i have never liked windows, learned to program in BASIC. i guess some folks like being sandboxed in by their OS under the guise of "security", but everyone should have the option to take control of their PC
Even thought the creators of the language said in their forum "please don't create malware with Nim" ... thanks for the video. It's nice when the language gets some attention. It is very nice, especially for the people who love Python.
I love how Ed Sheeran is teaching me how to write a malware lol
😂😂
On point.
😂😂you make my day
Whenever I read shit like this I cringe at how often the receiving person must get this joke, like when ultrasound techs hear "is it a boy or a girl?"
@@jg2283 you're not alone brotha 😭💀
Finally, Nim will be shone into light. Great video, even though Nim don't endourse making malware with it 😂
Any language than can be compiled into native executable (with relatively smallish runtime) will be used to write malwares. In the past: asm, C/C++, delphi. Now what: go, rust, nim, D?
too late!! xD
Dude, I like how you cover so much material in such a efficient time, I really appreciate it!
Writing malware is easy. In an airgapped network, deploy AV, EDR, and IPS+IDS to a couple of VMs and at a gateway. That takes maybe 1 day. Now you have a lab. Write custom malware, deploy, and see what gets caught. Don't even need to be complicated malware, just basic functions that do what you want it to do. Now, be creative in how you obfuscate its code and operations. Live off the land. On one red team, I got Mimikatz to slip right past their EDR simply by prefixing the PowerShell with 200 MB of comments. It's too large to analyze, so the EDR didn't bother. A few months ago, I got a basic reverse shell to work by having the code hide itself in new LNK files that pulled the rest of the code from environment variables.
Parsing junk to files to bypass AV is such a funny thing to see work. So trivial to do as well!
"GPT4 please explain this like if I was 5 years old"
Dude I love your content. You go very deep with basic language that takes me step by step. Good job and keep up the hard work :).
Just want to ask you, why don't you make videos about cloud security. I know it is a massive topic, and I would love watching more about it, especially from you.
This is my first time hearing about this nim it’s syntax looks a little similar to python, tnx for this interesting tutorial
I was about to skip the ad but stuck around when I heard the names. That looks like a solid platform.
Awesome video, man! Keep up the great work :)
🎉
Waiting for your malware development part 3 lol
Keep it up too, really like ur Videos!
crow what are u doing here bro
I’ve been studying exploit dev for the last month or so, I already have programming experience and work in cyber. I picked up Maldev Academy yesterday, and feel like it is going to give me a years worth of experience in just a couple weeks by how in-depth it is. It’s expensive, but I justified the cost by thinking about how many hours I’d spend researching to find all of the same info. The framework they give you for learning maldev is amazing.
how much is it ? and can you get ur money back if u find it worthless..so many companies claim that they are the best, then when u pay for a subscription, it SUCKS
@@rxtechandtrading lifetime access is $499, with Johns discount code it was $450. IMO I think it's very good. Like I said in my comment above, you can find all of the info from doing your own research, but the time save this gives is worth it.
Hey any idea how hackers bypass 2FA in facebook. How they get the code or do something else? I had 2FA in fb was hacked. Fb has no customer support either. Wondering if ya have any idea. Thanks.
@@anupkarki8237 I think it has something to do with a technique called CSF -client side forgery request -but there is some phishing involved with that i believe-you essentially need the token or session cookie of another authenticated user -if that is what u r trying to do
@@rxtechandtradingfrom what I know, you’d be very lucky to find Facebook allowing CSRF on any of their pages
When I learn a new programming language I write "What's up bitches?!" Instead of "Hello World."
This is a nice video on how to read code manuals. A big thing I wish I was taught earlier is how to not rely on examples of code and be able to know what to do from the manuals.
on linux you can type --help after any command to get some help/optional switches/examples.. or put "man" before the command to see the full manual.. i copy the important stuff to the mousepad so i can refer back to it easily
Nim is such a great language! The syntax of Python and the speed of C
I have been wanting to learn NIM for a while. I might try to use it for my upcoming OSEP (I know that they want me to use python and C# but I don't think it matters.).
I'm not a fan of malware (for obvious reasons), but if people will start learning Nim because of it, maybe they will see all that's good about Nim outside of it's offensive application. Good Video, as usual.
The point of learning to write malware is to better understand how to identify and protect against it, at least from a ethical hacking perspective
@@scootergirl3662 when I was younger I was into all things strategic warfare, biological warfare, WMD, stuff like that... it got to a point where I had downloaded every piece of literature that places like think tanks working for the US government, Janes, Los Alamos Laboratories and that famous Russian Biopreparat scientist defector allowed to leak in the public domain(I am not from the States but we are allied close enough that I still thank my lucky stars for not ending up in Guantanamo...)...
I don't know why others study malware but I just love me some forced complex system disassembly... a string of code bringing a whole system down? I get off on that!!!
I also once cried when I accidentally suffocated a praying mantis I had caught in a jar... holes in the lid, y'all... holes in the lid...
@scootergirl3662 that's what i thought he was gonna do but ok.
I wish you could create a series of Nim focused on offensive and defensive tools.
0:34 no!
@@ligiat134xplain
Was waiting for this to be posted.
nice tutotorials, i think john ippsec trix are the best in our era.
who's trix .??
A malware for many is a goodware for someone else :D
with a thumbnail like that who could resist clicking 🙃
i wonder if anti-social people actually writes "Hello World!" or if they write "Just you wait motherfuckers...."
That was very technical, but interesting video!
Not watching to learn how to do but to understand how it’s done 😌
Thanks John, great video👍!
I just love the Nim language.
Him: we gonna see how we can write malware
Me: print("malware")
Hey big fan of yo man (Cyber Security Student)
Nim is a new programming language for me, but maybe i should check that.
First: do not use common required APIs, use something exotic that does same work. Make malware work slowly, do not trigger suspicious behavior. All that usual stuff is tracked by AV software, so do not use it. Use some zero day exploit, do not mass stuff, do slow polymorphic or metamorphic code encryption. But best way: if you can do all of it find legal job, get money there.
Hey Johny ! I like that the way you teach something, you Rock dude 🤘
This is what a hero looks like
I am so excited to check out MalDev, thanks for sharing your thoughts on it!
Can you give me your thoughts about MalDev when you take it, I’m so curious
Seeing from the comments I can see anybody has no idea how to evade anti viruses really. So here is a hint Obfuscation is the key... we encrypt the strings compress them... And Change methods name into random string arrays, adding dummy codes, masking data... etc. Thats the most basic. The advanced obfuscation requires subjects like anti debug and anti tampering the most important of all inventing your own compression algorithms...
good job john keep it up. i love you
John you’re the man!!!!!
thanks man. liked a lot.
If I write a good App, it feels good to know it's out there providing values to end users. If I spend same amount of time writing a piece of malware, then it gets patched, as if never existed, it'll be feelsbadman. So, I don't know... Cool knowledge though.
Once it's patched just leak the source code and let everyone run rampant with it. Like RAASNet, Zeus/zbot, apfell, etc.
Also being patched doesn't mean much lol. I've seen Server 2008 R2 in production as recently as 2023.
Am I the only one who think John needs to do a tutorial series on Sublime text? 😂
Please make more Nim content
Maldev Academy is quite exoensive
dang, just paid for maldev academy after seeing your tweet, 2 days before this 10% off dropped 🤦
How it the course work for maldev?
To be honest a bit costly if you see the life time plan if compared with TCM Malware analysis course... Not complaining about the course content.
You against the Chinese. Need you 😊
Thanks for this.
Hey John, we want a malware development playlist from you.
Great video.
John that service is over $200 dollars! I still am looking for work since Aug. 02.
What’s the limit of this applications applicability? How can you use this method to install data gathering, keystroke loggers, and zombies?
lol, I don't know why but hearing anyone talk about this stuff (MalDev) enthusiastically from _this_ perspective is funny to me.
I've learned all those things over the years for completely different reasons, in modifying games I encounter lots of stupid anti-debug tricks and have to learn the same craft as malware authors to circumvent the anti-debug surrounding a lot of games DRM. I don't even have any interest in pirating games, but that shit gets in the way 😕
Make a full vedio on NIM language full course complete ✅
Nice information.
really want to finish OSEP so i can start modernising my tradecraft with nim, I really don't like Visual Studio + CSharp
Modern technology of Nobita, bit understanding
NimGang!
do more of these vedios
This is a cool video and nice to see, but I'd much rather it have been done in C or C++
I'm at if nothing on the internet can be trusted, I'm currently using a disposable phone anyway.
make android notepad. ask all permission. read contacts sms gallery send internet to your server. user installed accept all permissions even notepad not need
FR: Bonjour... oui... la police... c'est pour signaler un homme ! Qu'a-t-il fait ? C'est un hacker ! 0_ 0
EN: Hello... yes... police... this is to report a man ! What did he do ? It's a hacker ! 0_ 0
Sliver only works up until i try generate the listener then it just endlessly compiles
i didn't write hello world in my life,, i always write Test1
love the idea of maldevacademy, but starting at 250$ is a bit XD
I feel like my fbi agent is watching me since the moment I clicked this video😂😂
No matter what anybody says, videos about hacking/pentesting are always going to be used maliciously, and the knowledge is going to be exploited.
you are so fast man
Okay, Why?
Hey man,
Can you suggest/make some videos on how decompilation to assembly/key activation (and protections against this) work?
It's a topic I've always found interesting, but pretty hard to make headway with, despite being an engineer myself.
Not sure how current it still is, but there is a book called Practical Malware Analysis that you might like, comes with code examples etc...
@@TheodoreWard Thanks. I'll check that out!
just increase the file size of the infected program goes undetected every time. on all windows based systems
More explain
Bing
Medal
How to time job joining
I have made a couple pieces of "EDUCATIONAL USE" Malware on Android and Windows. I try to make funny malware.
After heavily squinting my eyes I wanna tell you that that microsoft doc site has a dark theme when you scroll to the very bottom, on the left side
amazing video
In Iran we should work 2 or 3 month for achieving 250$ for starter plan of maldev academy. sadly.
Brutal Economypill
What’s the best way to become an ethical hacker? I have no IT background.
Hello brother, greetings from Argentina.
golang vs rust, for pentesting or red team?
Off topic but are you using a type 1 hypervisor ? if so which one ? cause that windows vm is more performant than my native install
use c/c++
@@sumitsangrampurkar8558c/c++ was designed to sit like right on top of registers. Any extensive low level projects should be done in c/c++ imo.
Thank you Seth Rogan
In my opinion anybody who is writing malicious code for the purpose of distributing, misleading and/or causing harm, should be considered and tried as a terrorist and do at least 25 to life prison sentence.
Step 1.) Learn voltage manipulation
what is he using for the terminal autofill?
Used to make malware like this in 3 seconds with scripts lol, wonder if its still possible
What? How?
I am thinking to make a malware which will store at code cave of PE file and i want a shell from that victim pc
How can I do that?
@ayyleeuz4892 that’s why I’m asking. I had started my new journey with maldev about 3-4 days ago and i want to learn that’s why I’m asking
@ayyleeuz4892 I know how to put malicious code at code cave of the PE files but what after that?
I want to learn, can you suggest me some good resources?
@@snehbavarva8383I may suggest you to just stop writing malware - it will get you in a lot of trouble (and it got me too), but if you still want to - just don't talk about it on internet
@@geckwwolmfao what there's nothing illegal about writing malware, the issues come in when you run it on machines that aren't your own
when u hack can you skip steps or do u have to start in order? very confusing stuff i want to learn but damn
WHAT I NEED TO LEARN TO UNDERSTAND THAT ? THX FOR THE VIDEO
how many will learn to make malware for your computer?
i tried the same program in linux but got the error "execution of an external program failed: gcc -o......."
I run nim c runner.nim
this program is full of windows specific code, so it won't compile on linux with gcc.
If this is allowed here, it's bc newest antimalware solution can detect it.
How are you guys able to subscribe to academies like maldev
JS + PY = NIM
hi john, how long is the code valid until?
Are most malwares made for Windows environment?
Yes
12:38 isnt NULL = 0? Correct me if i'm wrong but i think that NULL is just 0
NULL is literally nothing! it's not zero because zero is already interpreted like an integer
you can learn all this for free unless you just want the shiny cert that no employer is asking for just like every other online course.
Teach learning privat mr you succes
I don't negotiate with terrorists. I'm available right now. K. I I legally cannot see ok! : TNT someone sent that to me.
Noice
So would this be a Trojan?