0xD3struction
0xD3struction
  • 33
  • 40 245
💉💾 How Hackers Really Change Process Memory ❓ (ASSEMBLY)[HACKING BASICS] #hacking
FOR EDUCATIONAL PURPOSES ONLY !!
In this video I will show how to change process memory without standard process operation procedures. This time we will only use WriteFile and ReadFile to get the same results as in the previous video.
Переглядів: 630

Відео

💉HOW HACKERS READ & WRITE PROCESS MEMORY ❓ (ASSEMBLY)[PART1/2] [REAL HACKIG/HACKING BASICS] #hacking
Переглядів 848Місяць тому
FOR EDUCATIONAL PURPOSES ONLY !! In this video I will show you how hackers getting access to current Process Memory! How they can dump it into file or how they can change section in process memory from code from the file. GetCurrentProcessId() : learn.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-getcurrentprocessid OpenProcess( ... ): learn.microsoft.com/en-us/wi...
🐍 UNDETECTABLE PYTHON VIRUS EXAMPLE + SOURCE CODE [MALWARE]
Переглядів 7972 місяці тому
FOR EDUCATIONAL PURPOSES ONLY !! 4TH part of Overwrite Viruses, this time undetected python virus. SOURCE CODES SOON!
💀 HOW HACKERS CHANGING EXE FILES ? [HACKING BASICS]
Переглядів 1,1 тис.4 місяці тому
‼️ FOR EDUCATIONAL PURPOSES ONLY ‼️ 👉 FIRST PART: ua-cam.com/video/JNe7dQZ6K8A/v-deo.htmlsi=yBnOI71Q7WXlR2O_ In This video you will see how easily hackers can change EXE files. Its second part of EXE FILES. In This Video: [ 1 ] - TimeDateStamp - After changing this nobody will be never knows when you created your file. [ 2 ] - SubSystem - How to Hide Your CMD window? [ 3 ] - AddressOfEntryPoint...
☠️ HOW HACKERS READING EXE FILES [HACKING BASICS]
Переглядів 3,9 тис.5 місяців тому
‼️ FOR EDUCATIONAL PURPOSES ONLY ‼️ 🔥 github.com/0xD3struction/0xD3struction/tree/main/HACKING BASICS/[2] READING EXE 🧨 In my opinion, this skill is absolutely fundamental if you want to become a hacker. Ofcourse it isn't last video about exe files. Will be much more. Its much better for start, then using nmap for example! Because, even if you will find som vuln app, how do you want to write Ex...
🔎 HOW MALWARE ALWAYS FIND WAY TO YOUR DATA ❓(ASM / C / VBS)[HACKING BASICS] #hacking #basics
Переглядів 4447 місяців тому
HOW HACKERS AND MALWARE ALWAYS FIND A WAY TO YOUR DATA ❓ First part of HACKING BASICS series. After watching this video you will be know, why no one uses direct folders paths. 3 example source codes: 👉 ASM 👉 C 👉 VBS SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/HACKING BASICS/[1]OS VARS ✔️en.wikipedia.org/wiki/Environment_variable ✔️learn.microsoft.com/en-us/cpp/c-runtime-libra...
📜VBS VIRUS EXAMPLE + CODE EXPLANATION [MALWARE]
Переглядів 6237 місяців тому
📜VBS VIRUS EXAMPLE CODE EXPLANATION [MALWARE]
☢️ MALWARE ANALYSIS [REAL VIRUS] STATIC/DYNAMIC
Переглядів 5348 місяців тому
☢️ MALWARE ANALYSIS [REAL VIRUS] STATIC/DYNAMIC
🔥 ASSEMBLY VIRUS EXAMPLE + CODE EXPLANATION [MALWARE]
Переглядів 1,1 тис.10 місяців тому
🔥 ASSEMBLY VIRUS EXAMPLE CODE EXPLANATION [MALWARE]
🎃 WINAPI SCREAMER IN C++ | HALLOWEEN SPECIAL 🎃
Переглядів 227Рік тому
🎃 WINAPI SCREAMER IN C | HALLOWEEN SPECIAL 🎃
💾 C VIRUS EXAMPLE + CODE EXPLANATION [MALWARE]
Переглядів 910Рік тому
💾 C VIRUS EXAMPLE CODE EXPLANATION [MALWARE]

КОМЕНТАРІ

  • @_rangop
    @_rangop День тому

    @echo off

  • @konstantinrebrov675
    @konstantinrebrov675 24 дні тому

    We need more of waltz music.

  • @tysonbenson
    @tysonbenson Місяць тому

    Excited to jump into this! Thanks!

  • @0xD3struction
    @0xD3struction Місяць тому

    SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/MALWARE/OVERWRITE_VIRUSES/PYTHON

  • @0xD3struction
    @0xD3struction Місяць тому

    SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/HACKING%20BASICS/%5B5%5D%20PROC%20RW

  • @0xD3struction
    @0xD3struction Місяць тому

    SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/HACKING%20BASICS/%5B4%5D%20STNADARD%20PROC%20RW

  • @0xD3struction
    @0xD3struction Місяць тому

    SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/MALWARE/OVERWRITE_VIRUSES/PYTHON

  • @Jeks-c2y
    @Jeks-c2y Місяць тому

    Great video for begginers to learn.

    • @0xD3struction
      @0xD3struction Місяць тому

      Thx ❤️ That's the purposes of this channel. Will be much more 😎

  • @iamdopalicious
    @iamdopalicious Місяць тому

    Hey, do you have the source code on git?

    • @0xD3struction
      @0xD3struction Місяць тому

      After second part. There is much easier and faster way to read or write process memory. This or next week 🙃

  • @tonkofonko
    @tonkofonko 2 місяці тому

    Hello my bro. This is sooo amazing. Amazing project. Can u make Full python code (convert to .exe) for steal google chrome cookies data like login credentials and save all of them to speciffic folder and then use target person cookies on other pc and acess to that accounts with login page using saved passwords ?

    • @0xD3struction
      @0xD3struction 2 місяці тому

      Thx a lot! Cool idea, but it isn't that easy. VBS/ASM will be better for this task, but unfortunately YT doesnt like this kind of videos and I personally don't support script kiddies (I hate those MFs) 🙃

    • @tonkofonko
      @tonkofonko 2 місяці тому

      @@0xD3struction thats true ok. Pls continue with similar video or pls start new series with Hacking using arduino like WiFi, get informations from WiFi router using Arduino Nano ENC28J60 LAN Module or else ...

    • @0xD3struction
      @0xD3struction Місяць тому

      Hacking with arduino? Like Mitm on RJ cable, software keylogger, capturing data from wireless keyboard or infecting pc by mouse? It's the Top shelf, but maybe someday it will appear. Stay tuned🙃

    • @tonkofonko
      @tonkofonko Місяць тому

      @@0xD3struction Hello again. Continue in what u want. U can try to make videos about like Hacking with Python or Arduino esp32 with cc1101 Car Replay attack (more popular) where attacker are able to unlock some car with captured key car key fob signal and emulate it) Have a nice day.

    • @0xD3struction
      @0xD3struction 28 днів тому

      I know what you talking about but I've never used my skills to rob people and have no intention of doing so 🙃

  • @ajleviskia3388
    @ajleviskia3388 2 місяці тому

    The IRS would like to know your location

  • @PLAY4FUN1111
    @PLAY4FUN1111 2 місяці тому

    bruh...

  • @0xD3struction
    @0xD3struction 2 місяці тому

    FULL VIDEO: ua-cam.com/video/QYPYYU8IZzA/v-deo.htmlsi=CGYGjvFBp3xFummL

  • @0xD3struction
    @0xD3struction 3 місяці тому

    SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/HACKING%20BASICS/%5B3%5D%20WRITE%20EXE

  • @megaadhd5194
    @megaadhd5194 3 місяці тому

    💪🔥

  • @ImieNazwisko-hm2if
    @ImieNazwisko-hm2if 3 місяці тому

    Nice ❤

  • @0xD3struction
    @0xD3struction 3 місяці тому

    👉 Full Video : ua-cam.com/video/BKZ1MfQHC-c/v-deo.htmlsi=e8yrKlE37PoHGUu4

  • @0xD3struction
    @0xD3struction 3 місяці тому

    1st PART(READ EXE) : ua-cam.com/video/JNe7dQZ6K8A/v-deo.htmlsi=vNVYRpgFrd9hg_j5 2nd PART(WRITE EXE) : ua-cam.com/video/BKZ1MfQHC-c/v-deo.htmlsi=q9GrErsEIQXHKytd

  • @AlfonsusBjaczys
    @AlfonsusBjaczys 4 місяці тому

    Wow 😮❤

  • @ImieNazwisko-hm2if
    @ImieNazwisko-hm2if 4 місяці тому

    😍😍

  • @jm-it
    @jm-it 4 місяці тому

    Niceeeee

  • @0xD3struction
    @0xD3struction 4 місяці тому

    🔥SOURCE CODES🔥 github.com/0xD3struction/0xD3struction/tree/main/HACKING%20BASICS/%5B2%5D%20READING%20EXE

  • @straw298
    @straw298 5 місяців тому

    omg I’m gonna make that and put it into my school computers’ system32 folder

    • @0xD3struction
      @0xD3struction 4 місяці тому

      There will be whole series about prank apps 🙃

  • @alphathinktink
    @alphathinktink 5 місяців тому

    Instead of memcpy you can simply typecast the buffered file data to the structure type and read the file data directly from the buffered file data, thereby reducing memory usage and run time.

    • @0xD3struction
      @0xD3struction 5 місяців тому

      This method is already use in next video, to show another way of filling the struct 🙃 For those who don't know what it is, struct could be filled up also in this way: --------- IMAGE_NT_HEADERS32 *NTHeaders; NTHeaders = (IMAGE_NT_HEADERS32*)(FILE_BUFF+Pe_Offset); ---------- Ofcourse, I will upload both versions on Github 😎

  • @DacicMC567
    @DacicMC567 5 місяців тому

    Great content mate, keep it up 👍👍🔥

    • @0xD3struction
      @0xD3struction 5 місяців тому

      I know 😁 Thx a lot! ❤️ I'll do my best! 💪

  • @monad_tcp
    @monad_tcp 5 місяців тому

    take this like only because of nostalgia of seeing DevC++

  • @alwinwatt9840
    @alwinwatt9840 5 місяців тому

    😘 "PromoSM"

  • @LuxembourgishMapping
    @LuxembourgishMapping 5 місяців тому

    I thought it's stepford county railway

  • @loteria89
    @loteria89 7 місяців тому

    Pretty infomative speed it up and turn the music lower

  • @0xD3struction
    @0xD3struction 7 місяців тому

    ua-cam.com/video/s4p41u60Zio/v-deo.htmlsi=e6lPKrRD5Hpzb41v

  • @ItsCOMMANDer_
    @ItsCOMMANDer_ 7 місяців тому

    Couldnt you use "nasm - f bin file.s -o out.bin"? Or something like that

  • @somecommentarydude
    @somecommentarydude 7 місяців тому

    No way man's using VBS in 2024...

    • @0xD3struction
      @0xD3struction 7 місяців тому

      I don't think that VBS has expiration date 🙃 Get ready for 16 bits DOS COM files 😜

  • @quantdev
    @quantdev 7 місяців тому

    "vbs virus" bro i made those when i was like 7 years old its really not that freaking hard 💀

    • @0xD3struction
      @0xD3struction 7 місяців тому

      Its more Tribute to vbs ❤️ then showing super hard virus ☠️ When I was 12 I created IMO very good USB worm in VBS, and ofcourse it will be on Channel in Worm Series. Not everyone knows that something like VBS exists, so Its also good opportunity to remaind how dangerous it can be.

  • @ultra98000
    @ultra98000 7 місяців тому

    mate that's not shell code at all 😭

    • @0xD3struction
      @0xD3struction 7 місяців тому

      I think it is. Explain then what it is 🙃

    • @Ethan0047
      @Ethan0047 7 місяців тому

      wtf is shell code😭

    • @EStartive
      @EStartive 7 місяців тому

      @@0xD3structionit’s machine code dum dum

  • @jaromir_hodan
    @jaromir_hodan 7 місяців тому

    Virustotal is not good enough. Try to run it in AnyRun next time

  • @0xD3struction
    @0xD3struction 7 місяців тому

    nasm -f elf shellcode.asm ld -o shellcode shellcode.o objdump -d shellcode

  • @Anonymous-pi8gf
    @Anonymous-pi8gf 7 місяців тому

    Lol rip

  • @0xD3struction
    @0xD3struction 7 місяців тому

    ua-cam.com/video/B3ipq6PLW2E/v-deo.html

  • @chilledPL
    @chilledPL 7 місяців тому

    Dang bro im not suspicious when it hits 10 lmao

  • @0xD3struction
    @0xD3struction 7 місяців тому

    ua-cam.com/video/7C6Dd1goIec/v-deo.htmlsi=TFORzsATqEjvolr4

  • @0xD3struction
    @0xD3struction 7 місяців тому

    ua-cam.com/video/B3ipq6PLW2E/v-deo.html

  • @KamilNowak-j8j
    @KamilNowak-j8j 7 місяців тому

    😮❤

  • @AlfonSus-si7hn
    @AlfonSus-si7hn 8 місяців тому

    Its really working! THANKS ! ❤

  • @maxmuster7003
    @maxmuster7003 9 місяців тому

    The first of this dangerous batch files was born back in time in the stone age of MSDOS from a giant dinosaurus egg. It bites in the file system.

  • @maxmuster7003
    @maxmuster7003 9 місяців тому

    But a pump gun can destroy files faster.😂

  • @abdurrahmankadric3738
    @abdurrahmankadric3738 9 місяців тому

    COM is also an executable. It dates to the MS-DOS era.

    • @0xD3struction
      @0xD3struction 9 місяців тому

      COM is already unsupported by default on Win10. (It could be turned on) Will be videos of COM, for eg. in Overwrite Viruses Series.

  • @Sokanas42
    @Sokanas42 9 місяців тому

    Screen Savers are executables. Any really there isn't any legit reason that Windows still allows them to be executed post Windows XP tbh

    • @0xD3struction
      @0xD3struction 9 місяців тому

      Yes, that's right. There is no reason to support this file type.

    • @abdurrahmankadric3738
      @abdurrahmankadric3738 9 місяців тому

      I have a DVD logo screensaver.

  • @dr.stephen.strange
    @dr.stephen.strange 9 місяців тому

    Damn! Never knew this! Thanks for sharing!

  • @czresgamer9837
    @czresgamer9837 10 місяців тому

    F - secure 😂