How does malware connect to and keep persistent connection to C2 server? (different methods and diagrams etc. throughs would be super interesting and helpful)
Do you have a way to contact you? Information here was good but I have some details involving these types of attacks that is heavily unknown except in certain underground places.
@@infidon9229 you're not going to be a sim swapper lmao, don't get yourself arrested trying. Anyone who actually made any sort of money from it is in jail or on the run, most of the money is basically unusable aswell.
Hi, Can you make a video about SIM LOCK, this feature available in Android and iPhone. How is the sim lock work? Would it prevent SIM SWAP? AND further more about Esim. Would Esim prevent sim swap since it's not a physical sim card? Thanks
Basic explanation for sim card attack
How does malware connect to and keep persistent connection to C2 server? (different methods and diagrams etc. throughs would be super interesting and helpful)
Do you have a way to contact you? Information here was good but I have some details involving these types of attacks that is heavily unknown except in certain underground places.
can you tell me
@@infidon9229 you're not going to be a sim swapper lmao, don't get yourself arrested trying. Anyone who actually made any sort of money from it is in jail or on the run, most of the money is basically unusable aswell.
Why the f are u asking for then gerard
Thanks...
Hi, Can you make a video about SIM LOCK, this feature available in Android and iPhone. How is the sim lock work? Would it prevent SIM SWAP? AND further more about Esim. Would Esim prevent sim swap since it's not a physical sim card? Thanks
Alex Lynd are you Roach Coach'es sun?
The guy with a hoodie is sure a hacker
He’s also sexy
😍
Algorithm +1
🙄
Algorithm.
wow hes cute
Pai of MUPPETS
Your old lady voice is not passable