• XSS.stack #1 – первый литературный журнал от юзеров форума

best methods to deliver payload via email? / лучшие методы доставки полезной нагрузки? (maybe incorrect translation)

pooron

HDD-drive
Пользователь
Регистрация
27.01.2022
Сообщения
30
Реакции
1
im pretty new to this and need help. if something i say doesnt make quite sense lmk and ill either delete the thread or rephrase the things ty.

im trying to social engineer someone to download my rat via email and i was wondering what would be the best method to make the file seem as legit possible

ive only heard of a technique called DLL Search Order hijacking where a legitimate windows app executes the payload and the file comes with a logo that looks like a doc/notepad.


EN : BAD
I'm pretty new to this and need help. let me know if something I'm saying doesn't make sense and I'll try to rephrase it.



I'm trying to get someone socially engineered to upload my rat via email and was wondering the best way to deliver the payload so it looks as legitimate as possible.



I've only heard of a technique called DLL search order interception where a legitimate Windows application executes a payload and the file comes with a document/notebook like logo.
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
im pretty new to this and need help. if something i say doesnt make quite sense lmk and ill either delete the thread or rephrase the things ty.

im trying to social engineer someone to download my rat via email and i was wondering what would be the best method to make the file seem as legit possible

ive only heard of a technique called DLL Search Order hijacking where a legitimate windows app executes the payload and the file comes with a logo that looks like a doc/notepad.


EN : BAD
I'm pretty new to this and need help. let me know if something I'm saying doesn't make sense and I'll try to rephrase it.



I'm trying to get someone socially engineered to upload my rat via email and was wondering the best way to deliver the payload so it looks as legitimate as possible.



I've only heard of a technique called DLL search order interception where a legitimate Windows application executes a payload and the file comes with a document/notebook like logo.
use fud exploit ..that will deliver your payload
ps : not use macros shit if you target unifcorns
 
An option could be hosting the payload in a trusted cloud service/storage provider (Google drive, dropbox, discord, etc) as a password-encrypted compressed file and send an email containing the URL to the victim, along with the password, and of course, use a good lure (there are tons of examples out there).
 
An option could be hosting the payload in a trusted cloud service/storage provider (Google drive, dropbox, discord, etc) as a password-encrypted compressed file and send an email containing the URL to the victim, along with the password, and of course, use a good lure (there are tons of examples out there).
I agree to this. You can also set up a server that hosts the payload where the user is redirected when they click the link on the email.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх