Nowadays crypting trojan don’t give a good result if you use use a public crypter , otherwise you need to buy a private edition or to hex it .
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
![[Image: 29726338.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_solA_UsgNrN3ZJVKAPlk5_1ZL8ogH06MLQQJGCbb7MJAxYQ_HPz9YCCA02K9_dIdhbVxFExfKd2C1KphxVRIgvUlu-FZyCL4KkOTn6eQosrPAibBqy=s0-d)
then -> general
![[Image: 91158931.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tCcqkYHaA1pxe0sLpUUOXRmPaQH2jW6J-PnECqFfq9hBMXecbD9TlNPDxw05f3iM76tNeHazh-znbR7aHkb8ZNTDethpswUnuu2XxhA60bIS3i_huBqg=s0-d)
Security & Encryption
![[Image: 50217601.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_v1q4dq7Wj9MBHThBGRHQhPEnlBTTGpCRNoN0K2hQxUfGzyYKDz2NGU08Vd7qVpc4JHbRn3_RoWVGFcOD6hjcgO12CTIzrTZ_7rSDZHFCTve14nejQa0g=s0-d)
Protection Method
![[Image: 47781258.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_taGOI8zYfDuWW2ladSSyCJ0i5Fag1Dty76p5cXq7kEsRZaZ9bw4jvI3pz0p_t4cFxSqSnNBpdLiLu7d2Gj1BM6QWGjJY-Nuo1Or0_8JbTfW5oLPyuG1g=s0-d)
and we are done !
Fesults :
poison ivy server :
![[Image: scnnp.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tRgNSIMDEjtCkN_kVHFPYpE-QSygT95YR2EB42GXKk4GTbmIQl8DP8S6UAe27b1eacXseB49U_0X4uNRMfKmpyIKGpZ20IP5swEeVHRLKsNns=s0-d)
bifrost server :
![[Image: scanno.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_tr-bxnM53BbV4bDC1bI87K10sgV-tCVRLsumhdIu42KZwPfPbZC90cur1myVoX5hxClBAEtg2_qfVs8c2ZIdvbNkUVWCSrnVpNRO0cjjxuX51X1w=s0-d)
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
then -> general
Security & Encryption
Protection Method
and we are done !
Fesults :
poison ivy server :
bifrost server :
No comments:
Post a Comment