Тёмный

How trojans work // A simple trojan malware in python with a command and control server ( C2 ) 

Leet Cipher
Подписаться 34 тыс.
Просмотров 56 тыс.
50% 1

Trojans are very scary malware that are capable of doing a great damage if not dealt with instantly, in this video, we will have a look at how a trojan malware works and why it's so hard to detect by AV products and we'll implement a simple trojan in python to demonstrate the idea, make sure to like, subscribe and share the video with whoever is interested in such topic and don't forget to turn on the notifications bell so you don't miss any future videos and thanks for watching.
project files on github: github.com/lee...
❤️ support the channel: / leetcipher
🎵 NCS: • Unison - Aperture | Pr...
/----- social -----/
/ leetcipher

Опубликовано:

 

21 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 62   
@theblackrat7350
@theblackrat7350 2 года назад
Amazing video bro, even knowing everything you talked about your didactic and unpredictability got me. Keep it up, please.
@The_neutrals
@The_neutrals 3 года назад
Woo.. Your channel intro is a theme music of alien shooter game..
@LeetCipher
@LeetCipher 3 года назад
Still a nice one tho, lol
@ahmedbelhcine1441
@ahmedbelhcine1441 2 года назад
Ohh bro my childhood game! Is it available to be downloaded online?
@The_neutrals
@The_neutrals 2 года назад
@@ahmedbelhcine1441 yes bro it is available
@TheManager963x
@TheManager963x 2 месяца назад
Oh i knew the song sounded familiar lmao
@KarolinaRiddle111
@KarolinaRiddle111 2 года назад
Great video, thank you very much. :) Would you tell me is it nessesary to provide information about User-Agent? Is this process is only for extra safety to pretend different web search? Can I ommit this? If this question is stupid, then sorry for it. :)
@LeetCipher
@LeetCipher 2 года назад
Yes, the User-Agent header is necessary because some websites block all requests that have suspicious User-Agent headers, and since the requests module in python comes with its own User-Agent header which might get flaged as a "bot", we used firefox's User-Agent to make the request look legit. And the extra process is just to fool the victim into thinking that there's nothing wrong or suspicious with this program.
@darkc0de275
@darkc0de275 2 года назад
Amazing tutorial and explanation, you just earned a sub :)
@LeetCipher
@LeetCipher 2 года назад
Thanks for the sub
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@foobar2988
@foobar2988 2 года назад
You are genuinely underrated man.
@ryanhaddad1833
@ryanhaddad1833 11 месяцев назад
I’m getting the error “OSError: [Errno 6] No such device or address found” any help
@gurvirsingh4190
@gurvirsingh4190 3 года назад
Great video as always and anyways looking for you to start bug bounty series ❤️❤️
@LeetCipher
@LeetCipher 3 года назад
Thanks, my friend ❤️
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@ravigond1811
@ravigond1811 6 месяцев назад
Love from India ❤
@lucasfossum4937
@lucasfossum4937 2 года назад
Am i on the fbi watchlist now?
@LeetCipher
@LeetCipher 2 года назад
yeah careful!
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Yes...Now watch this: Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@katha-studio
@katha-studio Год назад
😂😂
@gladiator7496
@gladiator7496 Год назад
@@justinlinwoodrossakarythor63 What??
@saketsrv9068
@saketsrv9068 3 года назад
Great teacher !!
@LeetCipher
@LeetCipher 3 года назад
Thank you! 😃
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@zimb3l
@zimb3l 8 месяцев назад
good tutorial, unfortunately i am now deaf due to the transition sounds
@SW-nx4jz
@SW-nx4jz 2 года назад
Can you show something similar to this but with the Mirai botnet?
@hampterclips
@hampterclips 2 года назад
I have something to ask and that's how do I get the encoded data for the blob command? I am probably just being dumb.
@LeetCipher
@LeetCipher 2 года назад
Just use gzip to compress the data and have python decompresses it at runtime as shown in the video
@arthurvuillet8067
@arthurvuillet8067 Месяц назад
Gonna prank m’y friend with it
@Tagaa81
@Tagaa81 8 месяцев назад
What blob suit’s ?
@judy8350
@judy8350 2 года назад
brand new bill nye the science guy
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@The_neutrals
@The_neutrals 3 года назад
Makes more malware series..
@LeetCipher
@LeetCipher 3 года назад
will do :D
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@thibno8260
@thibno8260 2 года назад
sorry i dont understand the point of all of this ? How this roundabout way to execute malicious code will help to evade antiviruses ?
@LeetCipher
@LeetCipher 2 года назад
The whole idea of the video is to show the masses how TROJANS work, the concept behind them. Also do you think a dummy python script like this can evade AV solutions!
@ronixbhaskar8263
@ronixbhaskar8263 2 года назад
Hello brother you have no given jsbon files on the github
@StudioHawaii
@StudioHawaii 2 года назад
lots of stuff can be coded in python nowadays
@LeetCipher
@LeetCipher 2 года назад
TRUE.
@daimonzolo5290
@daimonzolo5290 6 месяцев назад
Helllo, Can I convert the file py to exe, so the person who receive the file can open it
@joe-joe3540
@joe-joe3540 2 года назад
How did you get the headers?, Am stuck there
@majkl-iu3ee
@majkl-iu3ee 2 года назад
psutil and requests modulest dont exists for my pc
@LeetCipher
@LeetCipher 2 года назад
run => pip3 install psutil
@majkl-iu3ee
@majkl-iu3ee 2 года назад
@Leet Cipher where i paste this?
@LeetCipher
@LeetCipher 2 года назад
@@majkl-iu3ee in your terminal
@majkl-iu3ee
@majkl-iu3ee 2 года назад
@@LeetCipher still not working
@judy8350
@judy8350 2 года назад
eeeeeeeeeeeeeeeeeeeeeeeeee
@mikax1522
@mikax1522 Год назад
I deffo shouldn't run this on my computer.. how can I infect an Android with this?
@exploitdevs
@exploitdevs 6 месяцев назад
BRO i am trying to make it its hard
@deznuts1471
@deznuts1471 2 года назад
thought you said simple
@viljosaukko6349
@viljosaukko6349 8 месяцев назад
But how tf my own program had a trojan?
@rishabhrana3773
@rishabhrana3773 2 года назад
Sir teach us to how code it and documentation
@justinlinwoodrossakarythor63
@justinlinwoodrossakarythor63 2 года назад
Here you go...Watch Samara: ru-vid.com/show-UCKIZrCrSyW_db1ZFCE5-MZwvideos?view=0&sort=dd&shelf_id=0
@rishabhrana3773
@rishabhrana3773 2 года назад
@@justinlinwoodrossakarythor63 in python
@clumsygirl__
@clumsygirl__ 2 года назад
So... How can I contact you?! xD
@liam.3d265
@liam.3d265 2 года назад
oh yes this will truly hack someone. just get them to install the python interpreter beforehand, then send them the virus! they will never know!!!!
@shaheen4765
@shaheen4765 Год назад
:/ someone never heard of pyinstaller before
Далее
When you Accidentally Compromise every CPU on Earth
15:59
Hackers Are Waiting For You to Open This Image
15:18
Просмотров 227 тыс.
Just enough assembly to blow your mind
29:31
Просмотров 104 тыс.
How to Create Trojans Using Powershell
15:53
Просмотров 670 тыс.
How the Best Hackers Learn Their Craft
42:46
Просмотров 2,6 млн