Inside Ransomware: Building, Cryptography & Botnet Management π
Explore the practical aspects of ransomware development, cryptography techniques, and managing botnets in this comprehensive course. Perfect for ethical hackers and cybersecurity enthusiasts!

CyberCrashCourses
5 views β’ Jul 12, 2025

About this video
Link to Course: https://www.udemy.com/course/ethical-hacking-daniel-graham-video-companion/?referralCode=C56EEA92D994AF5F2EBE
In this lecture, we delve into the concept of ransomware, a type of malicious software that encrypts data on victim machines. The discussion includes building a basic ransomware that targets a single file, understanding the role of a reverse shell for communication, and implementing encryption with symmetric key algorithms like AES in counter mode. We explore storing and protecting keys using both symmetric and asymmetric cryptography, explaining how to use a public and private key pair to maintain security. The lecture also covers managing large botnets and the computational implications of different encryption techniques. Throughout, references to a detailed PDF and Python code examples are provided to aid in implementing your own ransomware for the week's homework.
00:00 Introduction to Ransomware
00:36 Building Your Own Ransomware
00:45 Reverse Shell and Communication
01:40 Encryption Techniques
02:13 Key Management Strategies
04:35 Asymmetric Key Cryptography
06:57 Combining Symmetric and Asymmetric Methods
09:13 Botnets and Ransomware Networks
11:46 Conclusion and Further Learning
In this lecture, we delve into the concept of ransomware, a type of malicious software that encrypts data on victim machines. The discussion includes building a basic ransomware that targets a single file, understanding the role of a reverse shell for communication, and implementing encryption with symmetric key algorithms like AES in counter mode. We explore storing and protecting keys using both symmetric and asymmetric cryptography, explaining how to use a public and private key pair to maintain security. The lecture also covers managing large botnets and the computational implications of different encryption techniques. Throughout, references to a detailed PDF and Python code examples are provided to aid in implementing your own ransomware for the week's homework.
00:00 Introduction to Ransomware
00:36 Building Your Own Ransomware
00:45 Reverse Shell and Communication
01:40 Encryption Techniques
02:13 Key Management Strategies
04:35 Asymmetric Key Cryptography
06:57 Combining Symmetric and Asymmetric Methods
09:13 Botnets and Ransomware Networks
11:46 Conclusion and Further Learning
Video Information
Views
5
Duration
11:58
Published
Jul 12, 2025
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.