What You Will Learn:
Fundamentals of Bash scripting and automation
Encryption and how they apply to ransomware
How ransomware operates and spreads
Cryptography by encrypting and decrypting files
Carrying out a basic Social Engineering attack
Establishing a bind shell and a reverse shell
Creating a key-based (passwordless) authentication using SSH
Using SSH and SCP to perform file copy (steal victim files) from target machine to attacker’s machine and vice-versa
Both the basic and advanced Bash Ransomware you will learn how to build in this course, will have the following features.
Basic Bash Ransomware Feature:
Encryption of files in the target directory
Removal of the original files (plaintext files) from the target directory
Advanced Bash Ransomware Feature:
Encryption of files in the target directory.
The ransomware will be able to encrypt itself, shreds and remove or delete its original self.
Display a message to the victim to pay a certain amount of money.
This course is designed for cybersecurity professionals, ethical hackers, and penetration testers who want to deepen their knowledge of malware behavior and scripting techniques.