Offensive Development and Tradecraft
by Ahmed Kasmani
Learn advanced skills of Red Team Operators and Offensive Developers.
What you will learn:
- Develop skills to create your own Implants and Loaders
- Bypass Yara Rules and Machine Learning Detections.
- Master the Art of Crafting Position Independent Code.
- Loading Reflective DLL from Position Independent Code.
- Harness Indirect Syscalls, Reflective DLL Injection, and Module Stomping.
- Advanced techniques like Stack Spoofing and much more
- View the full syllabus here which provides details of sections to be released.
- Programming in C using mingw compiler.
- X64Dbg, IDA Pro and Windbg.
- Python and CMake.
Learning Resources:
- Detailed video walkthroughs of code and debugging sessions, and complementary text.
- Multiple Showcase and Capstone Projects.
- Notion Template for Learning and Discord access.
- Self-Hosted Lab with Elastic EDR for testing Evasion and Opsec.
- Regular updates.
Hardware Requirements:
- CPU: 64-bit Intel i5/i7, or AMD equivalent. 2.0+ GHz or better processor.
- CRITICAL: Apple Silicon devices cannot perform the necessary virtualization and therefore cannot be used for this course.
- 16GB of RAM or more is required.
- 200GB of free storage space or more is required.
Course Curriculum
Section 00 – Introduction
-
Introduction
-
Changelog
-
Learning Resources
-
Archive Passwords
Section 01 – Creating the Lab
-
Download ISO and VM
-
Install Windows VM
-
Install Kali Linux
-
Install Tools on Windows VM
-
Installing Tools on Kali VM
-
Setting up Shares
-
Elastic EDR Setup on Kali VM
-
Havoc Installation on Kali VM
-
VM Download Link
Section 02 – Getting started with PE Files
-
Introduction
-
Compile First Exe file
-
Compile First Dll File
-
Write Code on Kali Linux VM
-
Finding Main Code from X64Dbg and IDA Pro
-
Debug GetHostName In X64Dbg
-
Debug Welcome Dll in X64Dbg
-
Code Review Apps in IDA Pro
-
LoadDll Code Review and Debugging
Section 03 – Basics of C Programming
-
Intro
-
PrintMe
-
ChangeMe
-
Arithmetic Operations
-
If than else statements in C
-
While Loops and Switch Statements
-
Arrays And Pointers
-
Strings
Section 04 – Windows Internals Primer – To be Released.
-
To be Released.
Section 05 – Assembly Language
-
Assembly Language Introduction
Section 06 – X64Dbg – Training
-
X64Dbg UI Overview
-
X64Dbg – Menu Options
-
Debugging in X64Dbg
Section 07 – Basics of IDA Pro
-
Introduction to IDA Pro
-
My Workflows – Part 1
-
My Workflows – Part 2
-
Use Ida Pro to migrate calls from Kernel32 Api to NTApi in minutes
Section 08 – Basics of Windbg – To be released.
-
To be Released.
Section 09 – Payload Storage
-
Basic Payload Execution
-
Debug Basic Payload Execution
-
Payload In Text Section – 1
-
Payload in Text Section – 2
-
Payload in New Section
-
Payload in Resource Section
-
Payload Stored at Remote Location
Section 10 – Capstone project: Payload Storage
-
Project to embed a payload in Image and load it from a remote location.
Section 11 – ODT Showcase: Yara Bypass – EDR Evasion via Shellcode Manipulation
-
Free Preview : Discovering the source of the detection FREE PREVIEW
-
Getting into the weeds of shellcode manipulation
-
Manipulating the shellcode to fully bypass the detections
Section 12 – Hiding Imports
-
Intro
-
How is Import Address Table Generated
-
A – Removing the C Runtime Initialization Code
-
B – Debugging the exe after removing the C Runtime Init code
-
Api Hashing Intro
-
Generating Hashes Via Python
-
Custom GetProcessAddress Via ApiHashing
-
Compiler Optimisation problems during IAT Removal
-
Custom GetModuleHandle
Section 13 – Detection Engineering and Basics of Evasion
-
Introduction
-
Hash Based Detections
-
Yara Rules
-
Indicators of Attack
-
Introduction to Machine Learning Based Detections
-
Introduction to ML Bypass
-
Updating Loader with Havoc SC
-
Moving Havoc SC to alternate location
-
Debugging the updated loader
-
Final Changes to complete ML Bypass
Section 14 – Payload Encryption and Obfuscation
-
Base64 Encoding
-
Xor
-
Rc4
-
AES
-
ShikataGaNai
Section 15 – Api Hooking
-
Api Hooking Intro
-
ApiHooking-Detours
-
DetoursYara
-
Minhooks
-
InlineHooking
Section 16 – Bypass Api Hooking – To be Released.
Section 17 – Injection
-
DllInjection
-
LocalModuleStomping – 1
-
LocalModuleStomping – 2
-
MapViewInjection
-
RemoteModuleStomping – Part 1
-
RemoteModuleStomping – Part 2
-
Threadless Inject – Part 1
-
Threadless Inject – Part 2
Section 18 – Direct and Indirect Syscalls
-
Syscall Intro
-
Extract SSN Details
-
Executing Payload Via NTApi
-
Executing Payload Via Syswhispers3
-
HellsGate
-
HellFireLounge
Section 19 – Reflective Dll Injection
-
Tasklist Dll Code
-
Reflective Dll Injection – Intro
-
Reflective Dll Injection Repo
-
Reflective Dll Loader Code Review
-
ReflectiveLoaderCodeReview
-
Convert Any dll Code to Reflective Dll
-
Covert Tasklistdll to Reflective Dll
-
Build Reflective Loader
Section 20 – Position Independent Code
-
PIC
-
Pic Troubleshooting
-
PIC Automation
Section 21 – ODT Showcase: ML Bypass – Building Evasive Module Stomper which loads PIC containing Reflective DLL.
-
Introduction
-
Build Payload
-
Build PIC Executable
-
Extract PIC from Executable
-
BuildModuleStomper Section
-
Debugging Final Executable
-
Review Changes to bypass EDR
Course Info
- Price : $529.99
- Lessons : 102
- Duration : 11 hours
- Course Name: Offensive Development and Tradecraft
Ask Academy Comparison
Compare Ask Academy with other training providers
Ask Academy
- Logical Sections - Easy to follow
- Continuous Updates
- Working Code Projects
- Video-based Training
- Text-Based Training (Work in Progress)
- Self-Paced Learning
- Fair Pricing Model
- EDR Installed in Lab
- Evasion Techniques
- Advanced Techniques covered in no other courses
- Ask Academy VMs
Competitors
- Evasion Techniques
- Working Code Projects
- Self-Paced Learning
- Text or Video Training - not both
- No Logical sections
- Tricky topics ignored
- Continuous Updates
- New Services are paid
- Academy VM
Photo Gallery
About the Author
Course Instructor
Ahmed Kasmani
Hi! I am Ahmed! I am currently working as Research Lead in Fortune 500 Company, where I reverse engineer malware and perform security research to understand attacker behavior. I have worked in Microsoft and CrowdStrike in Security Research, Security Engineering and Managed Detection and Response team. I have been working in Cyber Security industry for more than 15 years. I am passionate about making Cyber Security accessible to everyone. Through my course/s, my YouTube channel and social media I share what I am working on, support people in this wonderful field. I have spent a significant portion of my career on the front line. During this time, I have had the opportunity to work on major cybersecurity incidents, including WannaCry, NotPetya, Solar Winds, Proxy Shell, and others. Additionally, I have successfully protected numerous clients from major ransomware attacks. I am always happy to share my knowledge through social media, my YouTube channel and I have lately started working on accessible Cyber Security Courses. I understand that most of the courses out there are expensive, which is why this academy is solely focused on creating comprehensive courses which are affordable for our students.
Technologies used in the course
The programming Language used in the course is C. The main compiler we are using is Mingw, we use Visual Studio 2022 in Basics of C and 2 other sections. We are also using X64Dbg, IDA Pro and Windbg for research and debugging. We are using Elastic EDR for Detection and Evasion.
Video/Text Based Content
We provide Video and Text Based learning material, both of which complement each other. We also provide prepared Virtual Machine so the student can just download and use them in their own lab.
Note Taking
We provide access to Notion template to help with learning, keeping track of work completed and additional notes. We also provide access to Discord server for questions and general engagement with other students.
FAQ
The course material contains details explanations in Videos and Text based format. We will also provide access to Discord and for the first time we are going to provide access to special Notion Template to help with tracking progress, keeping notes etc.
This course is ideal for cybersecurity professionals seeking to advance their skills in offensive development, including penetration testers, red teamers, blue teamers, security analysts, and researchers. Whether you’re a penetration tester, red teamer, blue teamer, or security analyst, mastering offensive cybersecurity techniques opens doors to new career opportunities. Employers value professionals who can think strategically and understand both offensive and defensive tactics.
This course is ideal for cybersecurity professionals seeking to advance their skills in offensive development, including penetration testers, red teamers, blue teamers, security analysts, and researchers.
Yes the course will be updated every month with new and advanced materials.
No, the course does not expire. You will have life time access.