Forum Replies Created
- AuthorPosts
- Zaid SabihModerator
Hello Leylandm,
That depends on the VPN provider, you can either try to install their client (most providers offer a Debian client), or you can use openvpn as shown in the course (the provider has to give you openvpn config files).
Zaid SabihModeratorHello Qwefml,
If you do exactly what I do in the course your trojans will NOT bypass anything, why? because there are 400,000 students in my courses, so every method I show gets detected very quickly even if I show a method today.
What you should take from this course is the method, as mentioned by Deigo above, change options, edit hex….etc , you’ll have to keep doing that and experiment until you get it to bypass AVs, I still use these methods myself in real life pentests and I hacked big telecommunications companies with trojans built exactly as shown and by following the ideas posted by Dieog above, it just takes a LOT of time and a LOT of trial and error, it usually takes me a few hours to get it and I’ve been doing this for more than 10 years, so it might take you more than that but it will work if you put in the time and effort.
Anyway if you want a refund please email [email protected].
Zaid SabihModeratorI am updating the mail spoofing section yes.
Everything else is up to date as far as I know, I could be wrong though can you please tell me which parts you think are out of date?Zaid SabihModeratorHave you gone through the whole course Sithum? cause you asked about mail spoofing and AV bypass methods and all of this is covered in the course.
The course covers 5 ways to bypass AV programs.Zaid SabihModeratorAs I said best it to use a personal cloud or VPN storage, you can just sign up for one with Amazon or any other cloud provider.
There are lots of other file sharing services that you can use too if you just google “file sharing”.Zaid SabihModeratorYou’re welcome 🙂
Zaid SabihModerator14.2 and 14.3
Zaid SabihModeratorLooks like you didn’t have the i386 architecture, so we’ll add it first, then run the following commands to install the 2nd package.
dpkg --add-archedecture i386 apt-get update cd /root/Downloads dpkg -i python-typing_3.6.6-1_all.deb dpkg -i python-m2crypto_0.31.0-4_i386.deb
Zaid SabihModeratorYeah it should work everywhere.
Zaid SabihModeratorWhat do you mean?
Zaid SabihModeratorYou’re welcome, I’m glad I could help 🙂
Zaid SabihModeratorYeah the method shown in the social engineering course is free.
You can also use https://www.sendinblue.com/Zaid SabihModeratorUnfortunately no, you can try to use Google’s servers to do so after enabling less secure apps, (same way shown in my Python course but change the from email to whatever you want) but I am pretty sure they fixed this, it used to be possible.
Zaid SabihModeratorDropbox is good, but might delete the file if gets downloaded a lot or if it is detectable by AV programs.
Zaid SabihModeratorHello Sithum,
What do you mean what should you do? can you please tell me what exactly are you trying to do? - AuthorPosts