Nowadays crypting trojan don’t give a good result if you use use a public crypter , otherwise you need to buy a private edition or to hex it .
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
![[Image: 29726338.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sk-aqlPhSxb7AHhzI6wgFgptZRQm-1tEh3mORs38RJxep4_SaCX8j3QbNSS7gBZ5QGEi5GaOlv24Uznso1Y5Dm6W61_rW0nxN4YPtrz4EJqI_n2GzM=s0-d)
then -> general
![[Image: 91158931.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_vagR8pkg3HRMnND2lxGBdkulHKzc4-u_9ykUhmdYfvtwwzgGC-f71akHtI45DLJPFtWWF95GFYNSjyoCvl2x5MBEO-9DXZQIbjhFCWDuhhsuLzl5SD9A=s0-d)
Security & Encryption
![[Image: 50217601.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_udwVXn6OTanEa7yrnNhxwtVo6FPelj8Pwv6X2upAPbd55q0kIhNg79suh-fBbpIXsz1hLcLhFkbw2HbhvFSI-H2HJE0pbrUs2Vl-ckX205rCZcK7DvXw=s0-d)
Protection Method
![[Image: 47781258.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uviEQmNRvWrbHYPHR06WzD_mceXcFdHknR8Zq2mXyY-pfVyKB9cD8n4v5U6igDY9MMk0ac7lkf12cK-BEL-cHFPBY-3GFZeWAwkswyQEzxkPjPhKsf-A=s0-d)
and we are done !
Fesults :
poison ivy server :
![[Image: scnnp.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uqhoGrDGmJnt722ij6VSHzI_zGNyBRis5YIUOFX-qlwaSJc3hMvC54JS09DPjkhv3BeeyzU3AN6dd0wKRyy0g5kDFHzooo4Jc46IOT32QZJ4c=s0-d)
bifrost server :
![[Image: scanno.jpg]](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_sT79uOEfI8CaFml9Ot6Vi4_sCRuEDuTpZmTQdtevPLydoUR9Wk8eq02go86odvSdoIHPyIyc2a4kIB0YtblB3ncKBPPUiql8JXAeR23plNmBeZ2Q=s0-d)
so here’s a little tip to how make it almost FUD .
We are going to need a ( Privacy Protection Software )
This kind of softwares is used by programs creators to protect their creation from cracking and reverse engineering . We are going to do the same
to a trojan and you are going to see the result.
First of all you need to download the program : Scroll down and you will find the download link
let’s start :
server’s location ->
then -> general
Security & Encryption
Protection Method
and we are done !
Fesults :
poison ivy server :
bifrost server :
No comments:
Post a Comment