• XSS.stack #1 – первый литературный журнал от юзеров форума

Best advice on specifics and best practice for targeted individuals

princessroxy

CD-диск
Пользователь
Регистрация
23.03.2024
Сообщения
10
Реакции
3
I'm not sure if this is the best section to play this question or if it would be under phishing, please forgive me if this isn't the right section and I'll move.


I have a few hypothetical questions, but i will begin with the details. If someone had full access to high net worth individual computers via their secretary or spouses that were willing to open up any emails and run and install attachments without the targets knowledge of doing this...

1. What would be the best malware or rat to run so that you could gain access to their usernames/ passwords/ cookies in order to access their financial accounts as well as email and so on. Mobile provider login, seed keys, Microsoft single sign on and so forth....

2. Aside from their financial accounts and emails and other credentials would it be worth while to grab anything else or run anything else that could be exploited for financial gain.

3. What is the best program currently to remotely monitor target?

If further details are needed feel free to ask and I'll do my best to answer. I am new to the malware side of things and are more familiar with phishing and social engineering so any help is appreciated.
 
Nowadays the best will still be on phishing, Rats can be good but in most scenarios you will need a private crypter to infiltrate them proprely knowing that a lot of those people use Apple computer.
1) Any public or private Rat should be good with enough feature to monitor every activity on victims computer.
2Yes, any informations can be used. Informations is money just know how and when to use them
3) Try free open source like Dc Rat or quasar etc...

Dm me if you have good knowledge in phishing maybe we could do something together princessroxy
 
Nowadays the best will still be on phishing, Rats can be good but in most scenarios you will need a private crypter to infiltrate them proprely knowing that a lot of those people use Apple computer.
1) Any public or private Rat should be good with enough feature to monitor every activity on victims computer.
2Yes, any informations can be used. Informations is money just know how and when to use them
3) Try free open source like Dc Rat or quasar etc...

Dm me if you have good knowledge in phishing maybe we could do something together princessroxy
yeah a lot of those ppl use Mac
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх