Good breakdown, John. Assuming you haven't already made a similar video, it would be cool to see the flipside of this, which is how to evade being detected by malware. (VM detection, debugger evasion, etc). You could cover some of the different techniques that malware uses to know it's in a VM.
Hey John, just a small observation: The function Process32First() already populates the PROCESSENTRY32 struct with a process, so when you call Process32Next() you are effectively skipping the first process entry. I think it would be better to change it to a do-while so that the first process doesn't get skipped. Great video btw!
The code he wrote is absolute garbage, also forgets to close the handle of the snapshot. I basically stopped watching after this. His GetProcessId function is already a complete mess.
@@deedos I write windows kernel drivers and reverse the windows kernel and anti-cheat drivers, I've also worked on uefi bootkits. Not responding to you anymore waste of my time
True, nice observation. Sometimes I find Windows Programming really messy due its COM components nature. It reflects on its own API. Sometimes, I really miss these standardized structures like iterators from modern libraries that help us using for-loops when we do low-level programming.
Very good stuff! I would love to see more malware techniques sharing, such as AV evasion or process hollowing (or process doppelganger), which is also kind of fun too. Thanks!
Hei. Little info for using VS. You can press ctrl + shift + space to view intelisence if it disappear while typing your parameter. Edit: Or any other time writing a variable
Hey, John thank you so much for this incredible video. And I was wondering if it's possible to write all the C++ code using Nim language. I've developed a great fondness for Nim's syntax, finding it incredibly user-friendly and easy to work with.
C code is so ugly when compared to c++... I think you want a do loop instead of a while loop here 8:40 because you're skipping the first process it found. You also most certainly want to return an error value, an std::expected or throw if your name is not found. Not returning from a function with a return value declared is UB. See stmt.return#2. Use "-Werror-return-type". If I were to do this, I would just return the entire process handle instead of just the ID.
Any recommendations to learn os and computer architecture? What resources can I use? Can you do some fundamentals tutorials on os and architecture and how it works! Thanks man
Hmm, you're a good presenter John, but ... coder ... sorry, my friend. At least in a C/C++ sense. This is not Python, you need to close handles and release memory. Also after you call Process32First you are missing whatever it returned by calling Process32Next right away. Additionally, there are so many bugs in what you wrote I don't even know where to begin. But ... malware authors I guess don't care about memory leaks, hah?
Oh, the snapshot handle? That seems very nit-picky, considering he closed the other handle in the video. One mistake in a video where he hand typed a specific technique in C, and he forgot a handle. Do you write perfect code on camera the first time you write it?
Hay Bro @_JohnHammond how we can open malware or viruses in our system to examine that like you . Also scary about got harmed so plzz guide ❤🎉🎉 Even u r professional but you didn't care about malware abusing nature Big Fan Bro 😎 ❤ Love from India 🇮🇳❤
Also, I am surprised you are using visual studio instead of your favorite sublime text. I could never get into sublime text. I am considering going into the neovim croud a la @ThePrimeagen
Good breakdown, John. Assuming you haven't already made a similar video, it would be cool to see the flipside of this, which is how to evade being detected by malware. (VM detection, debugger evasion, etc). You could cover some of the different techniques that malware uses to know it's in a VM.
Hey John, just a small observation:
The function Process32First() already populates the PROCESSENTRY32 struct with a process, so when you call Process32Next() you are effectively skipping the first process entry. I think it would be better to change it to a do-while so that the first process doesn't get skipped.
Great video btw!
The code he wrote is absolute garbage, also forgets to close the handle of the snapshot. I basically stopped watching after this. His GetProcessId function is already a complete mess.
@@Tygo69maybe you could make your own video with better code then?
@@deedos I write windows kernel drivers and reverse the windows kernel and anti-cheat drivers, I've also worked on uefi bootkits. Not responding to you anymore waste of my time
@@Tygo69 I'm not questioning your abilities, I'm genuinely interested in watching your video if you think John's code is bad
True, nice observation.
Sometimes I find Windows Programming really messy due its COM components nature. It reflects on its own API. Sometimes, I really miss these standardized structures like iterators from modern libraries that help us using for-loops when we do low-level programming.
quite comprehensive, watched the whole vid and never got bored despite no actual xp with c. cool, thanks!
"Does this make sense?" spilled my coffee, and yes, mostly it does :D
Very good stuff! I would love to see more malware techniques sharing, such as AV evasion or process hollowing (or process doppelganger), which is also kind of fun too. Thanks!
Hi Hammond, Can you make a video about Scammer Payback How he does the hacking via anydesk
Hei. Little info for using VS. You can press ctrl + shift + space to view intelisence if it disappear while typing your parameter.
Edit: Or any other time writing a variable
*WE NEED MOOOOOOOOOOOOORE MALDEV VIDEOS LIKE THIS PLEASE*
Another banger, keep em' coming John!
now THIS is the type of content I like!
these videos are amazing please do more maldev videos these are your best videos in years
Hey, John thank you so much for this incredible video. And I was wondering if it's possible to write all the C++ code using Nim language. I've developed a great fondness for Nim's syntax, finding it incredibly user-friendly and easy to work with.
You are a Giga Chad honestly love your vids !!
Aha bring more malware stuff if possible loved this vid it would be awesome too see a vid on some kernal malware
Great video. Super fun to follow, try, and learn. Thank you! 👍
I thought I knew things until I watched this video lol. Still a great video john
Oh i am in love with this
Bro! Thank you so much for all you do! 🙇🏼
Awesome video, thanks for the breakdown.
C code is so ugly when compared to c++...
I think you want a do loop instead of a while loop here 8:40 because you're skipping the first process it found.
You also most certainly want to return an error value, an std::expected or throw if your name is not found. Not returning from a function with a return value declared is UB. See stmt.return#2. Use "-Werror-return-type".
If I were to do this, I would just return the entire process handle instead of just the ID.
The first entry is always system idle process.
No need to check it.
Also, the process entry struct he is working with here is over 256 bytes long, so idk about returning the whole thing.
You Are Fire Bro
🔥🔥
I Love Your Videos
Dope, just as I got into maldev,
Timing too perfect, I really suspect you're in my walls
Hi jh. Love ur code even if it breaks my brain (I'm a beginner)
Any recommendations to learn os and computer architecture? What resources can I use? Can you do some fundamentals tutorials on os and architecture and how it works! Thanks man
What are your top edr and av recommendations?
Does the technique illustrated required elevation? Also, is the code available somewhere?
I would pay to sit in a room and have this guy teach me
BANGER TYSM
"tricknique".. i like it.
great video love it!
How come John doesn't have more than "just" 603K subs? Such a cool and knowledgeable guy. Keep up the great work buddy!!! 💪
For someone making this kind of content, he has a ton of subs. General public interest just isn't huge.
Coz its hard to follow him, we arent all Kevin Mitnick's (RIP)
What should I learn to understand this code better?
Hei. C++ or any other programming language with OOP (Object oriented programming) to understand the principle of classes, functions and objects.
Thanks a million !
This thing is tough....damn you windows 32 api
John make a video on wazuh ? Open source edr tool and it's awasome.
I'm interested in that kind of stuff so that tech support scammers will get punished.
I sent you an invite in linked in but you didn't respond
Let's be honest
As L1 SOC Analyst
You cannot detect these without the EDR alerting you
This is honestly scares me as SOC Analyst
more!
Bro course are costly, I honestly want to purchase but cannot afford such a costly course to be honest. Otherwise great content
I wish every malware came with the file name of "evil.exe"
first comment
Sup
Why is your code SO BAD. Please stop nesting everything, there is literally no point in doing that
What was nested that shouldn't have been?
@@nordgaren2358 if statements
@@nordgaren2358 It looks like he introduced undefined behavior as well.
@@paradiseexpress3639 are you trying to say he shouldn't use if statements? What?
@@paradiseexpress3639 where is the undefined behavior?
very poor explanation, bro not everybody is a low level guru.
Hmm, you're a good presenter John, but ... coder ... sorry, my friend. At least in a C/C++ sense. This is not Python, you need to close handles and release memory. Also after you call Process32First you are missing whatever it returned by calling Process32Next right away. Additionally, there are so many bugs in what you wrote I don't even know where to begin. But ... malware authors I guess don't care about memory leaks, hah?
Process32First always returns the system process as the first entry, and is a waste to check.
Where did he forget to close the handle?
Oh, the snapshot handle?
That seems very nit-picky, considering he closed the other handle in the video.
One mistake in a video where he hand typed a specific technique in C, and he forgot a handle. Do you write perfect code on camera the first time you write it?
Too fast and confusing unless Im stupid.
@john Sektor7 or Maldev academy?
You could have make it with NIM
Hay Bro @_JohnHammond how we can open malware or viruses in our system to examine that like you .
Also scary about got harmed so plzz guide ❤🎉🎉
Even u r professional but you didn't care about malware abusing nature
Big Fan Bro 😎 ❤
Love from India 🇮🇳❤
@john
Also, I am surprised you are using visual studio instead of your favorite sublime text. I could never get into sublime text. I am considering going into the neovim croud a la @ThePrimeagen
Sup