Nowadays crypting trojan don’t give a good result if you use use a public crypter , otherwise you need to buy a private edition or to hex it .
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
![[Image: 29726338.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_shzzFcvROWY2lIPwGxtdnSG4-8Vuw2C5OO4W1r-EB-7WRh702KazX2xEBd4fskDKpzCNyyKxApFuvtO-sLVe2x9gqZIz1747PbcgUwHKbNixmmcm0F=s0-d)
then -> general
![[Image: 91158931.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vcMxVSzCzrgoGAiEhttxqMP28RZYxaqeiUP57F0DmAml340xw2_-9zGUkpyEUe7_t7ZVHmEaWW0j-CgWHq7ouwLUAbB0Zk1qcU1cDbExs-WCB3p7-5Eg=s0-d)
Security & Encryption
![[Image: 50217601.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vp2XCm0mW3vrSX20oOrDwtfTbJPW6lwQNMVvW6-Rgp6ew7K8S_gg9XDmjJqU82z92dh9yUZaB_GlASvcC5EHGqsth6TVan9WQ2cD22ube5wy2Mp0Ewfw=s0-d)
Protection Method
![[Image: 47781258.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_urOzjEOu1JZ-PgwjvDjP5X1gjFRz4oA1GTz3eXfE6YWFBseM1Y3QJilwXWJlc68rMWpjquYhsDbuz7Tdpe4I5Gbfj4pJMR386Ika7lCQ5jJ8SWKBAVDg=s0-d)
and we are done !
Fesults :
poison ivy server :
![[Image: scnnp.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_u8BeiIbzjH__gEAzhCkdxr3esA4pzJm467qL7vra1vbqBmIR9CyGe29EJlA3gVl5br3gWdoUmXWZ53GFyXZ0jmSy5uJendvfSxMtWHsnwtPUk=s0-d)
bifrost server :
![[Image: scanno.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tkwgR3qdVVTVsbQu5BU8Pw7X-w8xBssY5pbzkOGv-qfjF0M7K3sCTUqbT3DtOhIzjwMJddyg6YcC1TCrZV_qjkc53FUtrZZLF8ZUmmoYEPDejLQw=s0-d)
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
then -> general
Security & Encryption
Protection Method
and we are done !
Fesults :
poison ivy server :
bifrost server :
No comments:
Post a Comment