How to Create Trojans Using Powershell

Sdílet
Vložit
  • čas přidán 15. 09. 2021
  • ✅ Invest in yourself! Use my link and check out the first chapter of any DataCamp course for FREE! bit.ly/3AfQMpu
    ---------------------------------------------------------------
    This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of files in one!
    ---------------------------------------------------------------
    🧠 My hacking courses 👇
    zsecurity.org/courses/
    ---------------------------------------------------------------
    zSecurity Company - zsecurity.com/
    Community - zsecurity.org/
    Facebook - / zsecurity-145325078145...
    Twitter - / _zsecurity_
    Instagram - / zsecurity_org
    Linkedin - / zsecurity-org
    TikTok - / zsecurity_org
    ---------------------------------------------------------------
    ⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️.
    ---------------------------------------------------------------
    This video was sponsored by DataCamp

Komentáře • 804

  • @mannyislam1
    @mannyislam1 Před rokem +377

    I have a master's degree in Cyber Security and I can attest that your content is better than accredited universities.

    • @zSecurity
      @zSecurity  Před rokem +27

      Glad to see that you like it 👊

    • @ogvgamer3378
      @ogvgamer3378 Před rokem +2

      bro know i am 11th class i will also do masters in cyber security

    • @metinaktor5383
      @metinaktor5383 Před rokem +1

      Give your discord for the jobs. Thx

    • @royalsrivastava2079
      @royalsrivastava2079 Před rokem +1

      so should i go for masters in cyber security after my bachelors in Ai&ML ? i will appreciate your opinion!

    • @mannyislam1
      @mannyislam1 Před rokem +2

      @@royalsrivastava2079 artificial intelligence and machine learning falls under data science. Cyber Security is very different from Data Science. If you do go for Masters, go something related to data science. If you want to demonstrate some cyber security knowledge, certifications will help you better than college.

  • @unknownlordd
    @unknownlordd Před 2 lety +10

    lesson learned, always go to properties to check files extensions and never click links or any media from ppl you don't know
    ty so so much Zaid always making original and interesting videos

  • @anuragrsimha
    @anuragrsimha Před 2 lety +41

    Videos by Zaid Al Quereishi sir is a gem in their own form. Flabbergastingly, the course that I had completed is entirely different from what is in the scheduled syllabus prepared by the engineering university where I am pursuing a bachelor's degree.

    • @donhousam
      @donhousam Před 2 lety

      does this payload passing Facebook security bot +WhatsApp?

    • @anuragrsimha
      @anuragrsimha Před 2 lety

      @@donhousam Could you consider elaborating? Your question seems to be quite unclear, I'm afraid.

  • @nimira43
    @nimira43 Před 2 lety +64

    The best teacher / instructor ever. I'm enrolled on all your courses and your CZcams video tutorials are fantastic. Another of my favourite instructors on Udemy is Laz Diaz; he rates you very highly, saying you're a genius.
    Thanks for all that you do. Massive Respect

  • @michaelodor6788
    @michaelodor6788 Před 2 lety +105

    There is no video I don't learn from you.. you are simply the best

    • @mr_crapto
      @mr_crapto Před 2 lety +2

      yep i agree with you buddy

    • @Yoghaaa
      @Yoghaaa Před 2 lety +1

      Couldn't agree more

    • @kastakastakasta2933
      @kastakastakasta2933 Před 2 lety

      czcams.com/video/7fV1_f0ipcY/video.html :

    • @Patrickjphilippe
      @Patrickjphilippe Před 2 lety

      So can somebody explain to me about what this guy does because I’m interested in this so called security defense trade but would this be under coding or just hacking

  • @128bytes8
    @128bytes8 Před rokem +5

    that is the most barebones POC of a botnet ever. Very cool. Like the reverse shell code.
    Keep up the great work.

  • @DariNewsTv
    @DariNewsTv Před 4 měsíci

    youre my fav youtuber rn yove teached me alot , i wish i had money to buy your courses

  • @user-cl1mr8ox9k
    @user-cl1mr8ox9k Před 7 měsíci

    Keep up the good solid work! I enjoy your content because it answers the questions that I have. Great job!

    • @SagarNunia-md4wn
      @SagarNunia-md4wn Před 3 měsíci

      how I am gain the interface as shown in this video???

  • @ldandco
    @ldandco Před 2 lety +159

    This is the main reason why on Windows I always set the file explorer to view the extensions for all files.
    This way I know if what I am executing is a exe file or an actual file.

    • @zSecurity
      @zSecurity  Před 2 lety +58

      There are ways to spoof the file extension too, already covered in our courses or lookup RTL override.

    • @MrRobot222
      @MrRobot222 Před 2 lety +16

      @@zSecurity Even Widnows Defender would still block it. Plus you can't email this to someone as any email provider would block it, so how do you deliver it?

    • @oo7posam581
      @oo7posam581 Před 2 lety

      @@MrRobot222 Recently the security has been increased... So manual is only option

    • @yuliyy__
      @yuliyy__ Před 2 lety +1

      @@MrRobot222 Torrents

    • @MrRobot222
      @MrRobot222 Před 2 lety

      @ZcyberTech Antivirus would still block it

  • @jeanemeryenoga9949
    @jeanemeryenoga9949 Před 11 měsíci

    This is your best tuturial for ever. Thanks à lot master. 👏👏👏

  • @kbto
    @kbto Před 2 lety +1

    Very informative, you earned a subscriber

  • @wilwad
    @wilwad Před 2 lety +12

    It’s these basic tricks that get users owned. Ordinary users just double click files and don’t know not to click random EXEs even with show extension turned on

  • @decoder6878
    @decoder6878 Před 2 lety +2

    Nice video and awesome courses.
    I learnt a lot from your courses.

  • @MrRobot222
    @MrRobot222 Před 2 lety +277

    Great video, but 4 points. 1. Any decent email provider will block this if you try to email it to them. So what delivery do you use? 2. Most people will have file extensions on and see it's an exe file and never open it. 3. any anti-virus will then block it, including windows defender. So this is pretty much useless unless your target is really, really, really stupid and has gone out of their way to make themselves vulnerable! 4. as you're hosting the files, forensic analysis will link it back to you. 😂 Still, giving the video a like for the PowerShell info, but this is a terrible way to do it.

    • @zSecurity
      @zSecurity  Před 2 lety +104

      I did say its a quick and dirty way of doing it.
      All points you mentioned are valid but can be addressed and bypassed by this very Trojan, the video will turn into a full course if I do that though

    • @shidypix8726
      @shidypix8726 Před 2 lety +7

      So how would you go about it ??

    • @MrRobot222
      @MrRobot222 Před 2 lety +26

      @@zSecurity Please don't get me wrong. I've done 2 of your courses and really enjoy your content. As I said, the powershell side is useful. Just creating a FUD backdoor these days is getting harder and harder. Veil, FatRat, Empire, Shikata ga nai are all becoming detectable by both email and AV. It can be done, just takes so much more effort these days! 😊

    • @cyyborgg
      @cyyborgg Před 2 lety +5

      @@MrRobot222 Did you successfully make any undetectable backdoors yet? I tried myself but I failed miserably 😂😂

    • @MrRobot222
      @MrRobot222 Před 2 lety +13

      @@cyyborgg I've made several backdoors through various obfuscation techniques, but all detected, even by windows defender and the various email clients. I'm learning python with the hope of writing my own as this could be the only way forward.

  • @michaelwatson3962
    @michaelwatson3962 Před 2 lety

    Greetings to you sir i wana know if the 2nd command line content of the notepad which is in bat is placed to exe file i mean the backdoor file...my question is can exe file backdoor be used just like that...if so? pls describe briefly.................thanks regards

  • @necrqumOG
    @necrqumOG Před rokem

    which bat to exe converter are you using? I'm asking because I need one and you havent linked yours. All I founded were infected with malware.

  • @robinbijo
    @robinbijo Před 2 lety +2

    @zSecurity this is in case of an exe file,people will know that this is not an image file rather it is an exe file,so how can we make a backdoor behind an image?? Also how do you do it for a pdf file?

  • @shahiduae100
    @shahiduae100 Před 2 lety +4

    Dear Zaid
    No Doubt you are the best and first on Udemy
    I had already purchased and learned a lot from your series of Ethical hacker
    I would like to ask you if you could suggest it make video on parental care spyware
    Which is useful...
    God bless you

  • @grey1185
    @grey1185 Před 2 lety +8

    I took the courses Zaid offers. They are really great and its wonderful to see you making great content

  • @shellbng
    @shellbng Před 2 lety +3

    one of the best teacher zaid sir💯💯💯💯

  • @AwesomeCaden73
    @AwesomeCaden73 Před 2 lety +1

    What was the bat to exe file converter you used? I couldn't find the link.

  • @mastaghimau
    @mastaghimau Před 2 lety +3

    Very nicely explained Zaid... Thanks a lot for your sharing....

  • @manavgora1758
    @manavgora1758 Před rokem

    Wow that was an amazing practical, i am very impressed and i subscribed

  • @Malisha_Rasiru
    @Malisha_Rasiru Před 9 měsíci

    SSuperb Bro I have Ever Seen such a clear explanation 🤝

  • @joele2857
    @joele2857 Před 2 lety +2

    Thank you sir!!

  • @lingehmuhamed5718
    @lingehmuhamed5718 Před 5 měsíci

    please what tool are you using to listen for incoming connection? the interface is awesome please help me with it if anyone has an idea of the tool.. the video is great i'm recently following some of your videos in udemy it's great keep up with the good work.

  • @CoryResilient
    @CoryResilient Před 2 lety

    Do you have a course to bypass defender now in 2022 using this or similar methods. And is it possible to use veil powrshell bat to exe like your old video. Do the edits to the power shell options then encrypt the string even further to bypass defender now

  • @harshavardan9054
    @harshavardan9054 Před 2 lety +3

    Hey I have a doubt when the victim clicks in that image will if trigger the Security malware of the victim or it does not

  • @khizrshaikh9902
    @khizrshaikh9902 Před 2 lety +3

    Thanks for this Sir/Brother

  • @beloaded3736
    @beloaded3736 Před 2 lety +2

    Thanks Sir Zaid. Jazakallah khair.

  • @freeguy37
    @freeguy37 Před 2 lety

    Really helpful!

  • @obaidullah7780
    @obaidullah7780 Před 2 lety +1

    whats the name of listener which you have pre-installed on your system because from nc -vv -l -p 9001 cant be reached (KINDLY SOMEONE EXPLAIN KALI LINUX PART)

  • @tumon1237
    @tumon1237 Před 2 lety

    Hello Zaid, I am your big fan.I am eagerly waiting for a cyber security course from you. I know you are truly knowledgeable at this sector...

  • @Auriatta
    @Auriatta Před 8 měsíci

    okay so if I'm gonna use some default app that open specific formats then this shell will not execute right?

  • @limajrfabio
    @limajrfabio Před 2 lety

    Great video! Thank you for share! I always say check the origin, sometimes is not what you think.

  • @jamesrushforth1026
    @jamesrushforth1026 Před rokem

    So cool mate never seen anything like it can this be used on phone too iphone or android the newer ones???

  • @dhavalsuthar1
    @dhavalsuthar1 Před 2 lety +4

    Sir !! You are great 😊

  • @telo6739
    @telo6739 Před 2 lety

    Do you have a safe link for the "bat to exe converter"?
    Since that's such a typical name I'd guess several of those you find on google when searching that won't be safe.

  • @SagarNunia-md4wn
    @SagarNunia-md4wn Před 3 měsíci

    what tool are you using to listen for incoming connection?... Actually I am asking that

  • @igor-kostelac
    @igor-kostelac Před 4 měsíci

    Where can I find this hand pointer that you use in your presentation? Thank you

  • @RanaMSikandar
    @RanaMSikandar Před 2 lety +1

    Do you think it will pass throw windows defender. Mostly bat to exe are caught by windows defender

  • @uzi5998
    @uzi5998 Před 2 lety +7

    I bought your Udemy courses sir, ngl your explanation is the best.

  • @juniorpillay
    @juniorpillay Před 2 lety +1

    Can you show us without using empire or even Metasploit because using these frameworks are other people's programs doesn't teach us much but I do appreciate all your effort

  • @VenyaKeerex
    @VenyaKeerex Před 2 měsíci

    Do I need kali? Bc my pc does not like having virtualisation on and won’t let me use it

  • @CyberSecurity_Analysist
    @CyberSecurity_Analysist Před 3 měsíci

    brother which tool are you using on the terminal??(empire ..this one, what is this??)

  • @tojabdhei4881
    @tojabdhei4881 Před 2 lety

    Very useful bro ❤️

  • @MacronLacrom
    @MacronLacrom Před rokem

    So you make a bat file with those commands then you use another program to change the icon?

  • @jeandreterblanche418
    @jeandreterblanche418 Před 2 lety

    After the code from the Trojan is on the host computer, can the computer be connected to whenever the host is online? Even after the a period of time has passed (say a month)? I also assume it only works when the host is online

  • @robingood2493
    @robingood2493 Před 2 lety +3

    Of course its exe in the final or I would scary) Useful for a few type of things maybe. Not for main cases of course.

  • @daveodie1575
    @daveodie1575 Před rokem

    You are simply the best!!!

  • @kabandajamir9844
    @kabandajamir9844 Před 2 lety +2

    Good explanation sir

  • @manicsurfing
    @manicsurfing Před 2 lety

    Thanks man!

  • @lenovothinkpad9475
    @lenovothinkpad9475 Před 2 lety +1

    Thank you so much AS YOU CAN SEE

  • @MarkAnthonyGermanos
    @MarkAnthonyGermanos Před 8 měsíci

    Purely excellent.

  • @noema792
    @noema792 Před 2 lety

    Does this pen testing attack also work on Max computers or just on Windows?

  • @manofadventre83
    @manofadventre83 Před 2 lety

    I purchased your course and cannot access your website. to download the updated kali what do i do?

  • @akhilpandey1579
    @akhilpandey1579 Před rokem

    Should we use port forwarding while using this attack?

  • @timebomb2545
    @timebomb2545 Před 2 lety

    hello zaid i have a question i am learning on udemy your ethical hacking with python im at lesson 5 and we need to install kali but its not working on my pc when i want to click on the download it muliplys it can you help me?

  • @j7beamv3-kg7lw
    @j7beamv3-kg7lw Před rokem

    this tutorial helps alot man

  • @_guerrmo
    @_guerrmo Před rokem

    hey what software do i use to access the target?

  • @unlucky9095
    @unlucky9095 Před 2 lety +1

    Amazing great job

  • @ELLOHx3
    @ELLOHx3 Před 2 lety

    This is good stuff but the tutorial should have started from how the empire terminal (command & control server) was created.
    Or do you have a video for that?

  • @cryptolicious3738
    @cryptolicious3738 Před 2 lety +1

    better use a firewall n a/v . avg wont let apps connect unless they have an entry in the firewall...right?

  • @user-lk9ir9pt2m
    @user-lk9ir9pt2m Před 2 měsíci +1

    how do you build the connection between the code and kali?

  • @d_faceedit3419
    @d_faceedit3419 Před 9 měsíci

    i love this video but i already know this method and yeah that's great to see that because this same method i think and make a prototype of it and it work properly also implement in ms excel that download file from internet using cmd then run that file and perform the hacking after this it upload all the data to cloud really a great video for those who are learning

  • @dayshag5257
    @dayshag5257 Před rokem

    can you use metasploit instead of the program you used for the agents

  • @luismarrero9293
    @luismarrero9293 Před 2 lety +2

    great tutorial. Always didactic and a lot of learning .Thanks

  • @umerfarrukh7067
    @umerfarrukh7067 Před 4 měsíci

    how to we coonect this trojan to our kali machine console ?? please guide ...

  • @jeremycheong8036
    @jeremycheong8036 Před 2 lety +2

    I bought your course. Can’t wait to start learning! 🤟

  • @sreejithjinachandran7322

    Hello I just downloaded your customized Kali version
    I want to install "Yersinia" on it.
    But I'm executing this command "apt install yersinia"
    it's not taking showing "unable to locate package yersinia"
    Please help me on this

  • @GhostCrypto-tm1tl
    @GhostCrypto-tm1tl Před 2 lety +1

    A detailed explanation video , thanks a lot 👍

  • @0xazyz897
    @0xazyz897 Před 2 lety +2

    Amazing video Zaid, Thank you!

  • @DavidParathyras
    @DavidParathyras Před rokem

    I really like how you call the letter 'z' with its real pronunciation and not the American one

  • @johnsam3240
    @johnsam3240 Před 2 lety +1

    Nice one but what about windows defender or any other antivirus detection??

  • @chriscjjones8182
    @chriscjjones8182 Před 2 lety +2

    Why not just use the dos copy command with the b option? That way you have an actual image file not an exe and the image opens as normal but still runs the batch file as well. Very old technique now yes, but I'm asking is there a reason not to do it that way?

    • @SagarNunia-md4wn
      @SagarNunia-md4wn Před 3 měsíci

      ok, then what to do as your opinion... please tell me simply..

  • @josinjojy4268
    @josinjojy4268 Před 2 lety +5

    Please make a video on how to create an undetectable backdoor with C /C++ or assembly language

  • @picku4486
    @picku4486 Před 2 měsíci +3

    Dear Fbi, I'm here for educational purpose only!

  • @einsteinwallah2
    @einsteinwallah2 Před 2 lety +2

    you should now do a video on how to prevent being victim of such attack or detect if you are already attacked and how to prevent its consequences

  • @razorwire111
    @razorwire111 Před 2 lety

    Is there a way to reverse engineer this file? If I get sent this file and want to confirm it is a Trojan and identify the URLs. Any program I can drop it into to break it down?

  • @jamesmary9848
    @jamesmary9848 Před 2 lety +1

    thank you zaid

  • @mr.paranormal776
    @mr.paranormal776 Před rokem

    idk if im just stupid but does the adminstor of the trojan virus have to be on linux?

  • @anonymousking9817
    @anonymousking9817 Před 2 lety

    This is for Windows machine but for Android how to create trojan like in Windows we double click on image so that it executed but in android how?

  • @krunked4949
    @krunked4949 Před 6 měsíci

    So quick and ez!

  • @jaspreetsingh4362
    @jaspreetsingh4362 Před 2 lety

    Sir when i use right to left override it get deceted now how we can bypass that

  • @blackdevil5962
    @blackdevil5962 Před 2 lety +3

    sir i like your intro.. very well.

  • @amaanquadri2901
    @amaanquadri2901 Před 2 lety

    Zaid sir taken your 11 udemy courses love form India

  • @anonymous4911
    @anonymous4911 Před rokem +1

    Any Video to the kali machine he uses?

  • @jackwan358
    @jackwan358 Před 2 lety

    When the victim open the file, will it get UAC prompt if the users account is not a local administrator?

  • @MrSavindrasingh
    @MrSavindrasingh Před 3 měsíci

    That's why I always use "Show > File name extensions" as a default setting

  • @dummyd8625
    @dummyd8625 Před 2 lety

    Can we change the icon and other thing on the firsttime

  • @ibrahimgambo4904
    @ibrahimgambo4904 Před 10 měsíci

    very educative

  • @postmahtoast2736
    @postmahtoast2736 Před 2 lety +1

    This guys so good, I feel compromised by watching this video

  • @CloudsPC-jh5ql
    @CloudsPC-jh5ql Před 2 lety

    hey there zsecurity, can you tell me the video where you create your own trojan/code? I need it to troll my brother, thanks

  • @walterramirez5576
    @walterramirez5576 Před 2 lety

    would this work on someone's phone as opposed to a windows computer?

  • @user-qr8ty6ul9i
    @user-qr8ty6ul9i Před rokem

    Can we do this with mobile to get access of location and other things in android phone?

  • @Angelinajolieshorts
    @Angelinajolieshorts Před 6 měsíci

    Great person 😊

  • @hiamealhilwa6684
    @hiamealhilwa6684 Před 2 lety

    How can I convert the code to work on the Android system? Can I do this on the Windows system only?

  • @amoodanii
    @amoodanii Před 7 měsíci

    wow tnx 🤩

  • @praveenmalik8066
    @praveenmalik8066 Před 2 lety +1

    which tool you are using to get reverse connection? is it metasploit???

  • @donhousam
    @donhousam Před 2 lety +1

    is it working on any android version and on Windows ?does it pass Facebook or WhatsApp security bot?