Malware Development Essentials Course Post-Curriculum Criticism: Proving an Alternative.

Written by matejsmycka | Published 2023/12/22
Tech Story Tags: malware | cybersecurity | online-courses | criticism | malware-development | malware-development-course | red-team-operator | malware-development-essentials

TLDRvia the TL;DR App

I recently completed the RED TEAM Operator: Malware Development Essentials Course from Sektor7 Institute. Here is my honest opinion about this course, and I will try to provide resources that are at least equal in quality to the mentioned course.

I don't have a problem with the overall content of the material provided. I have a problem with the course format, the scripts, and the price. I hope this review will prompt a change in the authors' approach.

Positives

Don't get me wrong, the course will teach you what they say it will teach you, and it's really good for beginners. The course is a great intro to the Windows API. Even if you never want to create malware, the material is mostly very high quality, and I only criticize minor parts. If your employer offers you this course, definitely take it.

Criticism

first, the course contains 4 hours of material in videos. Some parts of these videos only repeat previously mentioned things and do not contain any informational value. For example, the narrator shows the disassembled code x64dbg several times and spends much time looking for different parts in the assembler. This reflects an actual debugging process, but it is unsuitable for video. If text and screenshots were provided, the material would be much shorter and equally educational. Many things are duplicated, and I don't think the viewer must see compile.bat run 15 times throughout the course.

The course would benefit if it were in text form or supplemented by short videos explaining the complex parts.

Secondly, the code is OK, but the compilation scripts are not broken down to the necessary details and work more automagically. You won't know what they do if you want to do something more custom. On the other hand, the code is broken down to the smallest detail, sometimes to the detriment. I know it is an essential course, but there is no need to explain the elementary operations C++. The viewer should be able to program; things like main functions getchar() do not need to be explained.

I would emphasize learning to search for information in the Windows API documentation and explaining what rights a given user must have to run them.

I know this is a personal preference, but why are demos shown inside note++ I prefer to show you how to set the maldev coding environment on Windows properly. Resources on how to get all needed components like compiler, make, required libraries, and how to generate shellcode.

And lastly, the price. This is a criticism not only of these materials but also of the certification business in general. The course costs $199, an industry-wide reasonable price for the material. I can see the value if you don't want to put effort into finding your materials and want to get them on a platter, but then I would debate whether you are even capable of learning how to create malware with that mindset.

If you are a third-world country citizen, student, or someone who tries to learn it just because of passion for a subject, I don’t think this is a good investment.

Providing an alternative

To support my arguments, I put together several sources based on the course's table of contents, trying to show that finding the same quality sources is not difficult and all the information contained in the course is freely available.

TOC of the Maldev course

  • Portable Executable
  • Droppers
  • Obfuscation and Hiding
  • Backdoors and Trojans
  • Code Injection

My alternative resources:

These resources are free and cover all sections of the course mentioned above.

I hope I have provided only constructive criticism, and nobody will get offended,

thank you for reading, and feel free to leave feedback.


Written by matejsmycka | -
Published by HackerNoon on 2023/12/22