Hackers Are Waiting For You to Open This Image
192,831
Published 2024-03-07
π΄ Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)π
www.linode.com/zsecurity
------------------------------------------------------------------------------------
Maythom personal Youtube channel: youtube.com/@maythom
Patreon: patreon.com/MAYTHOM
Instagram: www.instagram.com/mayth0m
Twitter: twitter.com/mayth0m
zSecurity Company - zsecurity.com/
Community - zsecurity.org/
zSecurity social media here ##
zSecurity Company - zsecurity.com/
Community - zsecurity.org/
Facebook - www.facebook.com/ZSecurity-1453250781458287/
Twitter - twitter.com/_zSecurity_
Instagram - www.instagram.com/zsecurity_org/
Linkedin - www.linkedin.com/company/zsecurity-org/
TikTok - www.tiktok.com/@zsecurity_org
-------------------------------------------------------------------------------------
Resources:
Icon convert website: icoconvert.com/
Github Tool: moom825/Discord-RAT-2.0
WinRar: www.win-rar.com/download.html
------------------------------------------------------------------------------------
Timestamps:
0:00 - Intro
00:45 - Thanks to Linode!
01:33 - Installing the tool
02:35 - Clarification
03:29 - Creating a Discord Bot
04:32 - Creating a Discord Server
05:28 - Building the backdoor
07:55 - Building the trojan
10:50 - Trojan in Action!
13:56 - Securing Yourself from this
15:06 - Thank you!
-------------------------------------------------------------------------------------
β οΈ Please be advised that this video is made for educational security purposes only. Also note that you shouldn't test on devices that you don't have permissions to test. We always have the permissions granted to test the accounts/devices used on this channel.
I hereby affirm that the devices employed in this video are under my exclusive ownership, and the primary purpose of this content is strictly educational. It is of great importance to emphasize that this video does not, in any way, endorse or encourage any unethical activities.
All Comments (21)
-
The LEGENDARY line "For educational purposes only"....πππ₯
-
I was scanning the image files with my antivirus and my friend was laughing, now I am gonna send him that video :D
-
When they say "educational purposes only" you know they ain't gon bs around π―π₯
-
How to identify: if you don't have file extensions enabled, do not open ones that appear with an extension, also scrs and com files are basically executable but com is old.
-
I love Z security for this reason . Their video is well explained and organized and so easy to understand the process β€
-
This is cool but nobody would actually fall for this because windows will have that pop up saying that itβs an untrusted executable
-
its scary how insecure windows is, thanks for sharing
-
I always look for the extension to be not ".exe" ... but the reverse character is new to me. So now I'll always also pay attention to filenames like "[filename] exe. [fileending]" So this would also work if you send .pdf files to other people...
-
Many youtubers says it's an educational vdieo but it's educating and updating an hacker for more features ππ like here if you like itππ
-
I love these , I like to open the exe in ida pro get the token and take control over the bot/ channel it is. Noticing people use either discord or telegrams as a command and control center , the biggest mistake is hard coding api or keys in the exe
-
thank you as a user how to identify such manipulated image
-
brilliant steganography technique
-
For one trillion years I've been trapped in my own decaying dimension, waiting for a new universe to call my own.
-
super i like it thanks for the valuable information.
-
Thank you
-
Thanks for guiding us for using VMware machine before practicing this work.
-
if an image is hacker thing and your image opener makes them hack you get rid of it as a image program reads out the image colors at their positions and voila no hacking on to you, and this goes also for your videos,,,
-
Wow! This has been insightful to me about the trojan. Thanks a lot lot more, very thankful sir... Any way i have a question, will the victim PC always be connected to the server immediately when the victim is connected to the internet, or it will require the user to open the trojan file.
-
Perfect zsecurity guys
-
This technique is actually very old, I knew about it in the 2000s, but before that no one discussed this matter