which is the best way to deliver malware . and how to speard malware
honest answers please....!
honest answers please....!
I want to know the possibility of practically re-targeting. Without persistence at Bios or OS level.To deliver malware effectively, study your target's environment to identify vulnerabilities in their security measures, including antivirus (AV), endpoint detection and response (EDR), and mail protection systems.
One common method is to send the malware as an email attachment, either zipped to bypass mail protection or as a document with macros enabled. When the victim opens the attachment, the malware is executed, often downloading additional malicious payloads from a remote server.
You may also exploit vulnerabilities in software or services used by the target. For example, use a phishing email to trick a user into clicking a malicious link that exploits a vulnerability in their web browser or operating system.
In cases where the target has strong security measures in place, you may use social engineering tactics to trick users into disabling or bypassing security features, such as AV or EDR, themselves.
To avoid detection, it's important to understand the target's security measures. Identify which AV/EDR/mail protection products are being used and analyze how your sample can bypass detection. For instance, sending the malware in a zipped file or as a document with macros enabled can help evade mail detection.
However, be aware that as soon as the malware is unzipped, it will likely come to the attention of the EDR, requiring you to figure out how to evade detection. Alternatively, target a small company that does not have EDR, as many companies don't, and then AV won't detect it unless it matches a known signature.
just opening email cant get the browser affected . they still have to click the link , so that they are redirected to a site where you have javascript code in the webpage to infect the browser.I want to know the possibility of practically re-targeting. Without persistence at Bios or OS level.
What are the possible ways to infect the target by having them just open the email, not the attachment?
I think that in theory, there could be malicious JavaScript that once executed, or image that once viewed, triggers a vulnerability in the browser and the OS. Is this likely? if it is Can i get this JavaScript exploit somewhere here?
What about sending the malicious JS in an email? I mean maybe someway to embed it in the email such that it executes when user views it. the email itself could include the JS expoloit could it not?just opening email cant get the browser affected . they still have to click the link , so that they are redirected to a site where you have javascript code in the webpage to infect the browser.
if theres a way or possibility ! please share your opinion on it
thank you : )
With landing page or fake app service site and deliver traffics to it, i can do this service for you and you can start your attacksHow can i do this? and can i do this for android apk files as well. Where do i buy this here
Macros dont work no more because of MOTW... You'd need to put it in a .iso fileTo deliver malware effectively, study your target's environment to identify vulnerabilities in their security measures, including antivirus (AV), endpoint detection and response (EDR), and mail protection systems.
One common method is to send the malware as an email attachment, either zipped to bypass mail protection or as a document with macros enabled. When the victim opens the attachment, the malware is executed, often downloading additional malicious payloads from a remote server.
You may also exploit vulnerabilities in software or services used by the target. For example, use a phishing email to trick a user into clicking a malicious link that exploits a vulnerability in their web browser or operating system.
In cases where the target has strong security measures in place, you may use social engineering tactics to trick users into disabling or bypassing security features, such as AV or EDR, themselves.
To avoid detection, it's important to understand the target's security measures. Identify which AV/EDR/mail protection products are being used and analyze how your sample can bypass detection. For instance, sending the malware in a zipped file or as a document with macros enabled can help evade mail detection.
However, be aware that as soon as the malware is unzipped, it will likely come to the attention of the EDR, requiring you to figure out how to evade detection. Alternatively, target a small company that does not have EDR, as many companies don't, and then AV won't detect it unless it matches a known signature.
How do you spread malware in torrents? Through SRT subtitles or through the video file itselfit depends on what you need , if you want specific targets from a specific country make landing page and make sure your stub if FUD and then use google,bing ads to get visitors and you can get traffic to your exe , another way is torrents which i use it until today but you can't guarantee the countries you may get india,pk , these countries did not give you back like crypto , banks,etc ... but you may accidentally get access to corp it happened to me more than once i got access to developers and then i got access to servers of companies this developer works for ...
Torrent can be used to make your stub have a longer life because it will not be faced with such directly nasty services as Google and Microsoft. Torrent is regarded as a p2p system so that it can be beneficial for advanced operations. In addition to the purpose of sharing files, it is possible to use the .torrent file extension to allow delivery of the middle stage of the malware infection chain.How do you spread malware in torrents? Through SRT subtitles or through the video file itself
No video i uses cracked apps and put my touch on exe then upload itHow do you spread malware in torrents? Through SRT subtitles or through the video file itself
but the cracked app is already backdoorNo video i uses cracked apps and put my touch on exe then upload it
Nop not all , if you are good you can cleaned the backdoored app if its not clean but there are tons of trusted ways to get a clean versionsbut the cracked app is already backdoor
What is your TG? PM pleaseTo deliver malware effectively, study your target's environment to identify vulnerabilities in their security measures, including antivirus (AV), endpoint detection and response (EDR), and mail protection systems.
One common method is to send the malware as an email attachment, either zipped to bypass mail protection or as a document with macros enabled. When the victim opens the attachment, the malware is executed, often downloading additional malicious payloads from a remote server.
You may also exploit vulnerabilities in software or services used by the target. For example, use a phishing email to trick a user into clicking a malicious link that exploits a vulnerability in their web browser or operating system.
In cases where the target has strong security measures in place, you may use social engineering tactics to trick users into disabling or bypassing security features, such as AV or EDR, themselves.
To avoid detection, it's important to understand the target's security measures. Identify which AV/EDR/mail protection products are being used and analyze how your sample can bypass detection. For instance, sending the malware in a zipped file or as a document with macros enabled can help evade mail detection.
However, be aware that as soon as the malware is unzipped, it will likely come to the attention of the EDR, requiring you to figure out how to evade detection. Alternatively, target a small company that does not have EDR, as many companies don't, and then AV won't detect it unless it matches a known signature.