Nowadays crypting trojan don’t give a good result if you use use a public crypter , otherwise you need to buy a private edition or to hex it .
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
![[Image: 29726338.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sFJa0_cZFcOBmoACe-HRoqHmAnyWx9ZKooQiPP48GB8-pxu82LX2dheFGGAoErEYrttxaG6cfRtH4H6CQhn3W2q7AP2Wf_aF1qS2EFm4yW8vDKe4S0=s0-d)
then -> general
![[Image: 91158931.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uW5pMkFHzn3Qe5fdEBD9JoE2qfI6r6fT1YytPRhdRDh3wVMjYMl2DQXhrZU_NNcpHL5fxHyLjzieM5xYQYKC88wEjlTshVWLCLx6-i2s5eUhr-HBN2EQ=s0-d)
Security & Encryption
![[Image: 50217601.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tMKZjrXCFAGNHwne5mYfYlGrEfZ66alQaSpUiy0R24YzU8DmyyV0-lcwAVyPeYb-1ne5YdHkLsXLTS3F109W49a4Q3Xs_5l7RqhApIjsWdGVRHCpw-Gg=s0-d)
Protection Method
![[Image: 47781258.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uFVkrt_sQSJDFxCxb5M63vM16OCWuJIDt68riF5N8yLTtzt865IqL-wyatn4mpjB3W3UWtum8MHCowUAKmj5wZtWmQBkqAg6KYz-lUmzkynyhG-zM5Pw=s0-d)
and we are done !
Fesults :
poison ivy server :
![[Image: scnnp.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sROEXfWJZKLGpo_88r3cpPjvzTRpHYgTFnzfzC93N1qpdi36rKJ-IKHQs9Q8CqkzhN-hQ5Mn84LHyXXO4_BamPI2vATGPZveRD1-XaOgJxavM=s0-d)
bifrost server :
![[Image: scanno.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tyAJn77zw-ktDAXAaqIGRgX1ZEt-5ZxJaT-FOuPLoM1Ko3AK7yweLV1fr_E9vwUMJbNVagU0G8todS0vJR6OsSozlmRKi21kVtwqqLC5gTKzomUA=s0-d)
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
then -> general
Security & Encryption
Protection Method
and we are done !
Fesults :
poison ivy server :
bifrost server :
No comments:
Post a Comment