How Hackers Write Malware & Evade Antivirus (Nim)

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 228

  • @volodymyrdrapak3842
    @volodymyrdrapak3842 Год назад +901

    Never said "Don't try this at home" or "Only for educational purposes". My hero.

  • @SkeeterPondRC
    @SkeeterPondRC Год назад +41

    When John says "I know this video is already getting long" and you are like "huh? keep going cause this is really interesting"
    Dont cut your videos short because you think we might be getting bored. This is awesome stuff! I would LOVE to see a longer video on this. Im a red teamer so building custom malware is something I really want to start playing with.

  • @Lampe2020
    @Lampe2020 Год назад +228

    I somehow always get motivated to program my own projects when watching your videos XD

    • @kent0n144
      @kent0n144 Год назад +22

      its because you think it will be as easy as watching him do it , thats just how i feel

    • @data_eng_tuts
      @data_eng_tuts Год назад +3

      ​@@kent0n144very true😢

    • @stevelin3659
      @stevelin3659 2 месяца назад +1

      Programmers do things not because it’s easy, but because we think it would be easy.

    • @Lampe2020
      @Lampe2020 2 месяца назад +1

      @@stevelin3659
      The sudden switch to the first person tells me you've been through that a bunch of times before...
      [EDIT]: And yes, none of the projects I'm currently working on _are_ easy, even though I started them thinking they _would_ be.

  • @Sevenigma777
    @Sevenigma777 Год назад +28

    Its things like this that got me into computers as a child in the 80s. There was like this secret world of PCs that the casual user never would experience. Whether it was just pirating software or hacking into networks it made you feel like absolutely anything is possible you just had to acquire the knowledge for it. Even to this day with how streamlined the modern PC experience is there is still a hidden world filled with programs and operations that even a well versed daily PC user has no clue they exist and I absolutely love it!

    • @cracc_baby
      @cracc_baby 5 месяцев назад

      same bro.. my first pc ran DOS, and my class had two apple IIe's.. meaning i have never liked windows, learned to program in BASIC. i guess some folks like being sandboxed in by their OS under the guise of "security", but everyone should have the option to take control of their PC

  • @tea_otomo
    @tea_otomo Год назад +48

    Even thought the creators of the language said in their forum "please don't create malware with Nim" ... thanks for the video. It's nice when the language gets some attention. It is very nice, especially for the people who love Python.

  • @marianoaponte2518
    @marianoaponte2518 Год назад +72

    I love how Ed Sheeran is teaching me how to write a malware lol

    • @redjhone8209
      @redjhone8209 Год назад

      😂😂

    • @malwaretestingfan
      @malwaretestingfan Год назад +1

      On point.

    • @amirakmel123
      @amirakmel123 Год назад +1

      😂😂you make my day

    • @jg2283
      @jg2283 Год назад +2

      Whenever I read shit like this I cringe at how often the receiving person must get this joke, like when ultrasound techs hear "is it a boy or a girl?"

    • @radicc
      @radicc 8 месяцев назад

      ​​@@jg2283 you're not alone brotha 😭💀

  • @Aziqfajar
    @Aziqfajar Год назад +31

    Finally, Nim will be shone into light. Great video, even though Nim don't endourse making malware with it 😂

    • @anta40
      @anta40 Год назад +1

      Any language than can be compiled into native executable (with relatively smallish runtime) will be used to write malwares. In the past: asm, C/C++, delphi. Now what: go, rust, nim, D?

    • @cracc_baby
      @cracc_baby 5 месяцев назад

      too late!! xD

  • @edwinrosales6322
    @edwinrosales6322 Год назад +8

    Dude, I like how you cover so much material in such a efficient time, I really appreciate it!

  • @zsi
    @zsi Год назад +4

    Writing malware is easy. In an airgapped network, deploy AV, EDR, and IPS+IDS to a couple of VMs and at a gateway. That takes maybe 1 day. Now you have a lab. Write custom malware, deploy, and see what gets caught. Don't even need to be complicated malware, just basic functions that do what you want it to do. Now, be creative in how you obfuscate its code and operations. Live off the land. On one red team, I got Mimikatz to slip right past their EDR simply by prefixing the PowerShell with 200 MB of comments. It's too large to analyze, so the EDR didn't bother. A few months ago, I got a basic reverse shell to work by having the code hide itself in new LNK files that pulled the rest of the code from environment variables.

    • @xTwistCinema
      @xTwistCinema Год назад +1

      Parsing junk to files to bypass AV is such a funny thing to see work. So trivial to do as well!

    • @FitnessNationOfficial
      @FitnessNationOfficial Год назад +4

      "GPT4 please explain this like if I was 5 years old"

  • @voodooexile2026
    @voodooexile2026 Год назад +7

    Dude I love your content. You go very deep with basic language that takes me step by step. Good job and keep up the hard work :).
    Just want to ask you, why don't you make videos about cloud security. I know it is a massive topic, and I would love watching more about it, especially from you.

  • @creed404
    @creed404 Год назад +3

    This is my first time hearing about this nim it’s syntax looks a little similar to python, tnx for this interesting tutorial

  • @neoninsv
    @neoninsv Год назад

    I was about to skip the ad but stuck around when I heard the names. That looks like a solid platform.

  • @crr0ww
    @crr0ww Год назад +21

    Awesome video, man! Keep up the great work :)

  • @0xSingularity
    @0xSingularity Год назад +8

    I’ve been studying exploit dev for the last month or so, I already have programming experience and work in cyber. I picked up Maldev Academy yesterday, and feel like it is going to give me a years worth of experience in just a couple weeks by how in-depth it is. It’s expensive, but I justified the cost by thinking about how many hours I’d spend researching to find all of the same info. The framework they give you for learning maldev is amazing.

    • @rxtechandtrading
      @rxtechandtrading Год назад

      how much is it ? and can you get ur money back if u find it worthless..so many companies claim that they are the best, then when u pay for a subscription, it SUCKS

    • @0xSingularity
      @0xSingularity Год назад

      @@rxtechandtrading lifetime access is $499, with Johns discount code it was $450. IMO I think it's very good. Like I said in my comment above, you can find all of the info from doing your own research, but the time save this gives is worth it.

    • @anupkarki8237
      @anupkarki8237 Год назад

      Hey any idea how hackers bypass 2FA in facebook. How they get the code or do something else? I had 2FA in fb was hacked. Fb has no customer support either. Wondering if ya have any idea. Thanks.

    • @rxtechandtrading
      @rxtechandtrading Год назад

      @@anupkarki8237 I think it has something to do with a technique called CSF -client side forgery request -but there is some phishing involved with that i believe-you essentially need the token or session cookie of another authenticated user -if that is what u r trying to do

    • @xTwistCinema
      @xTwistCinema Год назад

      @@rxtechandtradingfrom what I know, you’d be very lucky to find Facebook allowing CSRF on any of their pages

  • @fullmetaltheorist
    @fullmetaltheorist Год назад +7

    When I learn a new programming language I write "What's up bitches?!" Instead of "Hello World."

  • @XenoTravis
    @XenoTravis 11 месяцев назад +2

    This is a nice video on how to read code manuals. A big thing I wish I was taught earlier is how to not rely on examples of code and be able to know what to do from the manuals.

    • @cracc_baby
      @cracc_baby 5 месяцев назад

      on linux you can type --help after any command to get some help/optional switches/examples.. or put "man" before the command to see the full manual.. i copy the important stuff to the mousepad so i can refer back to it easily

  • @PySnek
    @PySnek Год назад +6

    Nim is such a great language! The syntax of Python and the speed of C

  • @TheHangman1995
    @TheHangman1995 Год назад +3

    I have been wanting to learn NIM for a while. I might try to use it for my upcoming OSEP (I know that they want me to use python and C# but I don't think it matters.).

  • @dolorsitametblue
    @dolorsitametblue Год назад +36

    I'm not a fan of malware (for obvious reasons), but if people will start learning Nim because of it, maybe they will see all that's good about Nim outside of it's offensive application. Good Video, as usual.

    • @scootergirl3662
      @scootergirl3662 Год назад +24

      The point of learning to write malware is to better understand how to identify and protect against it, at least from a ethical hacking perspective

    • @ycart_tech6726
      @ycart_tech6726 Год назад +2

      @@scootergirl3662 when I was younger I was into all things strategic warfare, biological warfare, WMD, stuff like that... it got to a point where I had downloaded every piece of literature that places like think tanks working for the US government, Janes, Los Alamos Laboratories and that famous Russian Biopreparat scientist defector allowed to leak in the public domain(I am not from the States but we are allied close enough that I still thank my lucky stars for not ending up in Guantanamo...)...
      I don't know why others study malware but I just love me some forced complex system disassembly... a string of code bringing a whole system down? I get off on that!!!
      I also once cried when I accidentally suffocated a praying mantis I had caught in a jar... holes in the lid, y'all... holes in the lid...

    • @madmax7539
      @madmax7539 Год назад

      @scootergirl3662 that's what i thought he was gonna do but ok.

  • @eduardabramovich1216
    @eduardabramovich1216 Год назад +78

    I wish you could create a series of Nim focused on offensive and defensive tools.

  • @JoakimBB
    @JoakimBB Год назад

    Was waiting for this to be posted.

  • @cot3chcot3ch96
    @cot3chcot3ch96 Год назад

    nice tutotorials, i think john ippsec trix are the best in our era.

  • @filipepinho3319
    @filipepinho3319 Год назад +2

    A malware for many is a goodware for someone else :D

  • @officialCLOZVRE
    @officialCLOZVRE Год назад +1

    with a thumbnail like that who could resist clicking 🙃

  • @AlgoRhytm
    @AlgoRhytm Год назад +8

    i wonder if anti-social people actually writes "Hello World!" or if they write "Just you wait motherfuckers...."

  • @pavi013
    @pavi013 Год назад

    That was very technical, but interesting video!

  • @AmazingJayB51
    @AmazingJayB51 Год назад

    Not watching to learn how to do but to understand how it’s done 😌

  • @guilherme5094
    @guilherme5094 Год назад

    Thanks John, great video👍!
    I just love the Nim language.

  • @paranormal5042
    @paranormal5042 Год назад +2

    Him: we gonna see how we can write malware
    Me: print("malware")

  • @skydrige
    @skydrige Год назад

    Hey big fan of yo man (Cyber Security Student)

  • @ianm00n
    @ianm00n Год назад

    Nim is a new programming language for me, but maybe i should check that.

  • @marcinnawrocki1437
    @marcinnawrocki1437 Год назад

    First: do not use common required APIs, use something exotic that does same work. Make malware work slowly, do not trigger suspicious behavior. All that usual stuff is tracked by AV software, so do not use it. Use some zero day exploit, do not mass stuff, do slow polymorphic or metamorphic code encryption. But best way: if you can do all of it find legal job, get money there.

  • @hamedranaee5641
    @hamedranaee5641 Год назад

    Hey Johny ! I like that the way you teach something, you Rock dude 🤘

  • @learning_with_irving4266
    @learning_with_irving4266 Год назад

    This is what a hero looks like

  • @Jake-km7wp
    @Jake-km7wp Год назад +1

    I am so excited to check out MalDev, thanks for sharing your thoughts on it!

    • @gelbertrivas4211
      @gelbertrivas4211 9 месяцев назад

      Can you give me your thoughts about MalDev when you take it, I’m so curious

  • @the-matrix-has-you
    @the-matrix-has-you Год назад

    Seeing from the comments I can see anybody has no idea how to evade anti viruses really. So here is a hint Obfuscation is the key... we encrypt the strings compress them... And Change methods name into random string arrays, adding dummy codes, masking data... etc. Thats the most basic. The advanced obfuscation requires subjects like anti debug and anti tampering the most important of all inventing your own compression algorithms...

  • @cot3chcot3ch96
    @cot3chcot3ch96 Год назад

    good job john keep it up. i love you

  • @khackney86
    @khackney86 Год назад

    John you’re the man!!!!!

  • @goohbr
    @goohbr Год назад

    thanks man. liked a lot.

  • @xiaoyi982
    @xiaoyi982 Год назад +6

    If I write a good App, it feels good to know it's out there providing values to end users. If I spend same amount of time writing a piece of malware, then it gets patched, as if never existed, it'll be feelsbadman. So, I don't know... Cool knowledge though.

    • @ian562ADF52E
      @ian562ADF52E Год назад

      Once it's patched just leak the source code and let everyone run rampant with it. Like RAASNet, Zeus/zbot, apfell, etc.

    • @ian562ADF52E
      @ian562ADF52E Год назад +4

      Also being patched doesn't mean much lol. I've seen Server 2008 R2 in production as recently as 2023.

  • @LeadinLP
    @LeadinLP Год назад +4

    Am I the only one who think John needs to do a tutorial series on Sublime text? 😂

  • @Br4dButt0wski
    @Br4dButt0wski Год назад

    Please make more Nim content

  • @fahadkhalid2303
    @fahadkhalid2303 Год назад

    Maldev Academy is quite exoensive

  • @tanhowseng
    @tanhowseng Год назад +1

    dang, just paid for maldev academy after seeing your tweet, 2 days before this 10% off dropped 🤦

  • @sreejishnair5922
    @sreejishnair5922 Год назад

    To be honest a bit costly if you see the life time plan if compared with TCM Malware analysis course... Not complaining about the course content.

  • @troysmith9652
    @troysmith9652 Год назад

    You against the Chinese. Need you 😊

  • @KeyserSoze407
    @KeyserSoze407 9 месяцев назад

    Thanks for this.

  • @nishantnarsale6279
    @nishantnarsale6279 Год назад +2

    Hey John, we want a malware development playlist from you.

  • @YannMetalhead
    @YannMetalhead Год назад

    Great video.

  • @viperjay1
    @viperjay1 Год назад

    John that service is over $200 dollars! I still am looking for work since Aug. 02.

  • @Jonathondelemos
    @Jonathondelemos Год назад +1

    What’s the limit of this applications applicability? How can you use this method to install data gathering, keystroke loggers, and zombies?

  • @MrGencyExit64
    @MrGencyExit64 Год назад +3

    lol, I don't know why but hearing anyone talk about this stuff (MalDev) enthusiastically from _this_ perspective is funny to me.
    I've learned all those things over the years for completely different reasons, in modifying games I encounter lots of stupid anti-debug tricks and have to learn the same craft as malware authors to circumvent the anti-debug surrounding a lot of games DRM. I don't even have any interest in pirating games, but that shit gets in the way 😕

  • @RaGhav363
    @RaGhav363 Год назад

    Make a full vedio on NIM language full course complete ✅

  • @nikhilkarpe8230
    @nikhilkarpe8230 Год назад

    Nice information.

  • @exosfear512
    @exosfear512 Год назад

    really want to finish OSEP so i can start modernising my tradecraft with nim, I really don't like Visual Studio + CSharp

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    Modern technology of Nobita, bit understanding

  • @0xAnomaly
    @0xAnomaly Год назад +2

    NimGang!

  • @firos5381
    @firos5381 Год назад

    do more of these vedios

  • @cmkarlav855
    @cmkarlav855 Год назад +1

    This is a cool video and nice to see, but I'd much rather it have been done in C or C++

  • @myalterego2878
    @myalterego2878 Год назад

    I'm at if nothing on the internet can be trusted, I'm currently using a disposable phone anyway.

  • @JarppaGuru
    @JarppaGuru Год назад +1

    make android notepad. ask all permission. read contacts sms gallery send internet to your server. user installed accept all permissions even notepad not need

  • @AntoineVanGeyseghem
    @AntoineVanGeyseghem Год назад

    FR: Bonjour... oui... la police... c'est pour signaler un homme ! Qu'a-t-il fait ? C'est un hacker ! 0_ 0
    EN: Hello... yes... police... this is to report a man ! What did he do ? It's a hacker ! 0_ 0

  • @madmackenzie3459
    @madmackenzie3459 Месяц назад

    Sliver only works up until i try generate the listener then it just endlessly compiles

  • @Hoosier7001
    @Hoosier7001 7 месяцев назад +1

    i didn't write hello world in my life,, i always write Test1

  • @artywatts4892
    @artywatts4892 Год назад

    love the idea of maldevacademy, but starting at 250$ is a bit XD

  • @amirbozorgmehrian8373
    @amirbozorgmehrian8373 Год назад

    I feel like my fbi agent is watching me since the moment I clicked this video😂😂

  • @oldschoolgaming6538
    @oldschoolgaming6538 Год назад

    No matter what anybody says, videos about hacking/pentesting are always going to be used maliciously, and the knowledge is going to be exploited.

  • @cbite1976
    @cbite1976 Год назад

    you are so fast man

  • @pamalapurplepantys4184
    @pamalapurplepantys4184 Год назад +1

    Okay, Why?

  • @sophiophile
    @sophiophile Год назад +1

    Hey man,
    Can you suggest/make some videos on how decompilation to assembly/key activation (and protections against this) work?
    It's a topic I've always found interesting, but pretty hard to make headway with, despite being an engineer myself.

    • @TheodoreWard
      @TheodoreWard Год назад

      Not sure how current it still is, but there is a book called Practical Malware Analysis that you might like, comes with code examples etc...

    • @sophiophile
      @sophiophile Год назад

      @@TheodoreWard Thanks. I'll check that out!

  • @simonrad
    @simonrad Год назад

    just increase the file size of the infected program goes undetected every time. on all windows based systems

  • @bhagyalakshmi1053
    @bhagyalakshmi1053 Год назад

    More explain
    Bing
    Medal
    How to time job joining

  • @NTGNoahTheGamer
    @NTGNoahTheGamer Год назад

    I have made a couple pieces of "EDUCATIONAL USE" Malware on Android and Windows. I try to make funny malware.

  • @kipchickensout
    @kipchickensout Год назад

    After heavily squinting my eyes I wanna tell you that that microsoft doc site has a dark theme when you scroll to the very bottom, on the left side

  • @Error-33
    @Error-33 Год назад

    amazing video

  • @VortexInfoTech-gw8hp
    @VortexInfoTech-gw8hp Год назад +1

    In Iran we should work 2 or 3 month for achieving 250$ for starter plan of maldev academy. sadly.

  • @aeligos
    @aeligos Год назад

    What’s the best way to become an ethical hacker? I have no IT background.

  • @fedenfer
    @fedenfer Год назад

    Hello brother, greetings from Argentina.
    golang vs rust, for pentesting or red team?

  • @imad6734
    @imad6734 Год назад

    Off topic but are you using a type 1 hypervisor ? if so which one ? cause that windows vm is more performant than my native install

  • @fakeacount1479
    @fakeacount1479 Год назад +4

    use c/c++

    • @ian562ADF52E
      @ian562ADF52E Год назад

      ​@@sumitsangrampurkar8558c/c++ was designed to sit like right on top of registers. Any extensive low level projects should be done in c/c++ imo.

  • @ngudududlamini252
    @ngudududlamini252 Год назад

    Thank you Seth Rogan

  • @jimmydandy9364
    @jimmydandy9364 Год назад

    In my opinion anybody who is writing malicious code for the purpose of distributing, misleading and/or causing harm, should be considered and tried as a terrorist and do at least 25 to life prison sentence.

  • @parkour.11parkour58
    @parkour.11parkour58 Год назад

    Step 1.) Learn voltage manipulation

  • @user-bg1xh3yl5o
    @user-bg1xh3yl5o Год назад

    what is he using for the terminal autofill?

  • @gwnbw
    @gwnbw Год назад +1

    Used to make malware like this in 3 seconds with scripts lol, wonder if its still possible

    • @snehbavarva8383
      @snehbavarva8383 Год назад

      What? How?
      I am thinking to make a malware which will store at code cave of PE file and i want a shell from that victim pc
      How can I do that?

    • @snehbavarva8383
      @snehbavarva8383 Год назад

      @ayyleeuz4892 that’s why I’m asking. I had started my new journey with maldev about 3-4 days ago and i want to learn that’s why I’m asking

    • @snehbavarva8383
      @snehbavarva8383 Год назад

      @ayyleeuz4892 I know how to put malicious code at code cave of the PE files but what after that?
      I want to learn, can you suggest me some good resources?

    • @geckwwo
      @geckwwo Год назад +1

      ​@@snehbavarva8383I may suggest you to just stop writing malware - it will get you in a lot of trouble (and it got me too), but if you still want to - just don't talk about it on internet

    • @sethadkins546
      @sethadkins546 Год назад

      ​@@geckwwolmfao what there's nothing illegal about writing malware, the issues come in when you run it on machines that aren't your own

  • @kerryfreudenthaler2986
    @kerryfreudenthaler2986 Год назад

    when u hack can you skip steps or do u have to start in order? very confusing stuff i want to learn but damn

  • @odymo4240
    @odymo4240 Год назад

    WHAT I NEED TO LEARN TO UNDERSTAND THAT ? THX FOR THE VIDEO

  • @auro1986
    @auro1986 Год назад

    how many will learn to make malware for your computer?

  • @maxdeploy
    @maxdeploy 6 месяцев назад

    i tried the same program in linux but got the error "execution of an external program failed: gcc -o......."
    I run nim c runner.nim

    • @nobrainnogame4320
      @nobrainnogame4320 8 дней назад

      this program is full of windows specific code, so it won't compile on linux with gcc.

  • @terror403
    @terror403 11 месяцев назад

    If this is allowed here, it's bc newest antimalware solution can detect it.

  • @RaymondsHangout
    @RaymondsHangout Год назад

    How are you guys able to subscribe to academies like maldev

  • @LIZARD-OFFICIAL
    @LIZARD-OFFICIAL Год назад

    JS + PY = NIM

  • @jghuathuat
    @jghuathuat Год назад

    hi john, how long is the code valid until?

  • @neilfpv
    @neilfpv Год назад +1

    Are most malwares made for Windows environment?

  • @IlliaZhdanov
    @IlliaZhdanov Год назад

    12:38 isnt NULL = 0? Correct me if i'm wrong but i think that NULL is just 0

    • @powermicrobe9454
      @powermicrobe9454 3 дня назад

      NULL is literally nothing! it's not zero because zero is already interpreted like an integer

  • @thelandoftwitchclips
    @thelandoftwitchclips Год назад

    you can learn all this for free unless you just want the shiny cert that no employer is asking for just like every other online course.

  • @Josua-v4c
    @Josua-v4c 10 месяцев назад

    Teach learning privat mr you succes

  • @IncomingRedacted-rv1tv
    @IncomingRedacted-rv1tv Год назад

    I don't negotiate with terrorists. I'm available right now. K. I I legally cannot see ok! : TNT someone sent that to me.

  • @technologybeebeebooboo
    @technologybeebeebooboo Год назад +2

    Noice

  • @SuperhumanFitness
    @SuperhumanFitness Год назад

    So would this be a Trojan?