Hackers Are Waiting For You to Open This Image

preview_player
Показать описание
This video will show you how hackers can control your device using a trojan via discord!

🔴 Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)👇

------------------------------------------------------------------------------------

## zSecurity social media here ##

-------------------------------------------------------------------------------------
Resources:
Github Tool: moom825/Discord-RAT-2.0
------------------------------------------------------------------------------------
Timestamps:
0:00 - Intro
00:45 - Thanks to Linode!
01:33 - Installing the tool
02:35 - Clarification
03:29 - Creating a Discord Bot
04:32 - Creating a Discord Server
05:28 - Building the backdoor
07:55 - Building the trojan
10:50 - Trojan in Action!
13:56 - Securing Yourself from this
15:06 - Thank you!
-------------------------------------------------------------------------------------
⚠️ Please be advised that this video is made for educational security purposes only. Also note that you shouldn't test on devices that you don't have permissions to test. We always have the permissions granted to test the accounts/devices used on this channel.
I hereby affirm that the devices employed in this video are under my exclusive ownership, and the primary purpose of this content is strictly educational. It is of great importance to emphasize that this video does not, in any way, endorse or encourage any unethical activities.⚠️
Рекомендации по теме
Комментарии
Автор

The LEGENDARY line "For educational purposes only"....💀😎🥃

mrdirect
Автор

When they say "educational purposes only" you know they ain't gon bs around 💯🔥

gtr
Автор

I was scanning the image files with my antivirus and my friend was laughing, now I am gonna send him that video :D

Observer
Автор

I love Z security for this reason . Their video is well explained and organized and so easy to understand the process ❤

mythbasters
Автор

Will it execute if I right-click on file to go to properties but I already have XNView MP with shell extension to show me image preview in explorer?

NikolaTomic
Автор

its scary how insecure windows is, thanks for sharing

OGmolton
Автор

Instead of turning off windows defender, you could add a exclusive folder or zone where the AV Wil not scan. I know some infostealers use this method

Muziek
Автор

it says gave error of backdoor.exe unable to find when i run, it run the jpg but it also gave error and also that session 1 isn;t created

OGprxyside
Автор

super i like it thanks for the valuable information.

arjun.tt
Автор

if an image is hacker thing and your image opener makes them hack you get rid of it as a image program reads out the image colors at their positions and voila no hacking on to you, and this goes also for your videos, , ,

tentimesful
Автор

can we use it for educational purpose on in mobile phones....??

RMX-BEATZ
Автор

I always look for the extension to be not ".exe" ... but the reverse character is new to me.
So now I'll always also pay attention to filenames like "[filename] exe. [fileending]"
So this would also work if you send .pdf files to other people...

Klebedose
Автор

Many youtubers says it's an educational vdieo but it's educating and updating an hacker for more features 😂😂 like here if you like it😂😂

pepe-js
Автор

It might work until you have file extensions enabled or download it from a internet browser, there it will say "image.jpg.exe"

TrippyMango
Автор

I love these, I like to open the exe in ida pro get the token and take control over the bot/ channel it is. Noticing people use either discord or telegrams as a command and control center, the biggest mistake is hard coding api or keys in the exe

donjohnson
Автор

Wait!! After the user opening you should close the picture, not going to discord, as user will not stare at the BMW forever. :)

stanislavsmetanin
Автор

thank you as a user how to identify such manipulated image

hithammelhem
Автор

Wow! This has been insightful to me about the trojan. Thanks a lot lot more, very thankful sir... Any way i have a question, will the victim PC always be connected to the server immediately when the victim is connected to the internet, or it will require the user to open the trojan file.

Compute_and_Hack
Автор

Is there a command to show their screen?

Nylester
Автор

is there any option to steal token discord to someone??

Berry
visit shbcf.ru