Nowadays crypting trojan don’t give a good result if you use use a public crypter , otherwise you need to buy a private edition or to hex it .
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
![[Image: 29726338.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_t-PgjOKC-mnv7xqToc295klTaUGNiisT9N1ZK1vG8QZ7NDFlbJlggadCQLOr8YVMyExTqmgt8f5cQygqSnsa01YmOhoIoQqGBJjTtKafOPQVRYoJxg=s0-d)
then -> general
![[Image: 91158931.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_skLI9ZMN4MBkwWyMJrRUwcx_0l7BgxYzfC9jw_OrKHIBRUAfnDpyFg4Iys2cPSERZl-cU7fBVD3us7xVlSdmeGAHIzjI8xw69mBH3pPn23KkCmvDfoRw=s0-d)
Security & Encryption
![[Image: 50217601.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vqvufMIGbX9dNlX6LjnW9_Q7JT_bfog0sCkMzyJuaveUzWJGmTgjBkb47jmWQMyO021Z_YGU_U5_q-uXGULrzW6f5ua-UOZgSu2UW_cYl7Q0epzOKISg=s0-d)
Protection Method
![[Image: 47781258.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sfUM2kd39rs0o_jm6NesglCrVLslF_42hNlZA8338fKirinCR3OWJ5E-_SnEmdmiIpaykBg_U8a4rbI7hILYiFR9-GQiut6s3KmDgTxabyjqazrXKxMQ=s0-d)
and we are done !
Fesults :
poison ivy server :
![[Image: scnnp.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_st3MKjoUY3nYKAsLKZDfgH7hdANzxaqVHYCrLrx_dQfdUX4C0hzr_fpIDdzTTi0cwxklScf8cWeX8rUjsM41DjPwQHvW1VXBIvCMRfr7dS6kg=s0-d)
bifrost server :
![[Image: scanno.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uUaVy9ZCs6QeDtPIduQEb_PZooStCwWaol0fRsjvl7Bfanw9WqHZujK7mARV6ZciPkcUSVlxvN8IVpuwiTKkK5H6GNSOVL_m39fmhxo3a5KqwRBw=s0-d)
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
then -> general
Security & Encryption
Protection Method
and we are done !
Fesults :
poison ivy server :
bifrost server :
No comments:
Post a Comment