Hackers Are Waiting For You to Open This Image

192,831
0
Published 2024-03-07
This video will show you how hackers can control your device using a trojan via discord!

πŸ”΄ Get $100 FREE credit on Linode to create your own cloud server (Valid for 60 days)πŸ‘‡
www.linode.com/zsecurity

------------------------------------------------------------------------------------
Maythom personal Youtube channel: youtube.com/@maythom
Patreon: patreon.com/MAYTHOM
Instagram: www.instagram.com/mayth0m
Twitter: twitter.com/mayth0m

zSecurity Company - zsecurity.com/
Community - zsecurity.org/

zSecurity social media here ##
zSecurity Company - zsecurity.com/
Community - zsecurity.org/
Facebook - www.facebook.com/ZSecurity-1453250781458287/
Twitter - twitter.com/_zSecurity_
Instagram - www.instagram.com/zsecurity_org/
Linkedin - www.linkedin.com/company/zsecurity-org/
TikTok - www.tiktok.com/@zsecurity_org

-------------------------------------------------------------------------------------
Resources:
Icon convert website: icoconvert.com/
Github Tool: moom825/Discord-RAT-2.0
WinRar: www.win-rar.com/download.html
------------------------------------------------------------------------------------
Timestamps:
0:00 - Intro
00:45 - Thanks to Linode!
01:33 - Installing the tool
02:35 - Clarification
03:29 - Creating a Discord Bot
04:32 - Creating a Discord Server
05:28 - Building the backdoor
07:55 - Building the trojan
10:50 - Trojan in Action!
13:56 - Securing Yourself from this
15:06 - Thank you!
-------------------------------------------------------------------------------------
⚠️ Please be advised that this video is made for educational security purposes only. Also note that you shouldn't test on devices that you don't have permissions to test. We always have the permissions granted to test the accounts/devices used on this channel.
I hereby affirm that the devices employed in this video are under my exclusive ownership, and the primary purpose of this content is strictly educational. It is of great importance to emphasize that this video does not, in any way, endorse or encourage any unethical activities.

All Comments (21)
  • @mrdirect4053
    The LEGENDARY line "For educational purposes only"....πŸ’€πŸ˜ŽπŸ₯ƒ
  • @sasTRproabi
    I was scanning the image files with my antivirus and my friend was laughing, now I am gonna send him that video :D
  • @gtr8741
    When they say "educational purposes only" you know they ain't gon bs around πŸ’―πŸ”₯
  • @abandonedcrack
    How to identify: if you don't have file extensions enabled, do not open ones that appear with an extension, also scrs and com files are basically executable but com is old.
  • @mythbasters3119
    I love Z security for this reason . Their video is well explained and organized and so easy to understand the process ❀
  • @flash_gang
    This is cool but nobody would actually fall for this because windows will have that pop up saying that it’s an untrusted executable
  • @OGmolton1
    its scary how insecure windows is, thanks for sharing
  • @Klebedose95
    I always look for the extension to be not ".exe" ... but the reverse character is new to me. So now I'll always also pay attention to filenames like "[filename] exe. [fileending]" So this would also work if you send .pdf files to other people...
  • @MR.9999MILLION
    Many youtubers says it's an educational vdieo but it's educating and updating an hacker for more features πŸ˜‚πŸ˜‚ like here if you like itπŸ˜‚πŸ˜‚
  • @donjohnson6063
    I love these , I like to open the exe in ida pro get the token and take control over the bot/ channel it is. Noticing people use either discord or telegrams as a command and control center , the biggest mistake is hard coding api or keys in the exe
  • @painandsuffer
    For one trillion years I've been trapped in my own decaying dimension, waiting for a new universe to call my own.
  • @tentimesful
    if an image is hacker thing and your image opener makes them hack you get rid of it as a image program reads out the image colors at their positions and voila no hacking on to you, and this goes also for your videos,,,
  • @Compute_and_Hack
    Wow! This has been insightful to me about the trojan. Thanks a lot lot more, very thankful sir... Any way i have a question, will the victim PC always be connected to the server immediately when the victim is connected to the internet, or it will require the user to open the trojan file.
  • @attageledek6836
    This technique is actually very old, I knew about it in the 2000s, but before that no one discussed this matter