How to Create Trojans Using Powershell

Поделиться
HTML-код
  • Опубликовано: 15 сен 2021
  • ✅ Invest in yourself! Use my link and check out the first chapter of any DataCamp course for FREE! bit.ly/3AfQMpu
    ---------------------------------------------------------------
    This video teaches you how to package powershell commands in a batch file and compile it to an executable to download and execute files. This can be used in many scenarios such as creating trojans, or combining a number of files in one!
    ---------------------------------------------------------------
    🧠 My hacking courses 👇
    zsecurity.org/courses/
    ---------------------------------------------------------------
    zSecurity Company - zsecurity.com/
    Community - zsecurity.org/
    Facebook - / zsecurity-145325078145...
    Twitter - / _zsecurity_
    Instagram - / zsecurity_org
    Linkedin - / zsecurity-org
    TikTok - / zsecurity_org
    ---------------------------------------------------------------
    ⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️.
    ---------------------------------------------------------------
    This video was sponsored by DataCamp

Комментарии • 806

  • @mannyislam1
    @mannyislam1 2 года назад +381

    I have a master's degree in Cyber Security and I can attest that your content is better than accredited universities.

    • @zSecurity
      @zSecurity  2 года назад +27

      Glad to see that you like it 👊

    • @ogvgamer3378
      @ogvgamer3378 2 года назад +2

      bro know i am 11th class i will also do masters in cyber security

    • @metinaktor5383
      @metinaktor5383 Год назад +1

      Give your discord for the jobs. Thx

    • @royalsrivastava2079
      @royalsrivastava2079 Год назад +1

      so should i go for masters in cyber security after my bachelors in Ai&ML ? i will appreciate your opinion!

    • @mannyislam1
      @mannyislam1 Год назад +2

      @@royalsrivastava2079 artificial intelligence and machine learning falls under data science. Cyber Security is very different from Data Science. If you do go for Masters, go something related to data science. If you want to demonstrate some cyber security knowledge, certifications will help you better than college.

  • @wtfdoiputhere
    @wtfdoiputhere 2 года назад +11

    lesson learned, always go to properties to check files extensions and never click links or any media from ppl you don't know
    ty so so much Zaid always making original and interesting videos

  • @nimira43
    @nimira43 2 года назад +65

    The best teacher / instructor ever. I'm enrolled on all your courses and your RUclips video tutorials are fantastic. Another of my favourite instructors on Udemy is Laz Diaz; he rates you very highly, saying you're a genius.
    Thanks for all that you do. Massive Respect

  • @anuragrsimha
    @anuragrsimha 2 года назад +41

    Videos by Zaid Al Quereishi sir is a gem in their own form. Flabbergastingly, the course that I had completed is entirely different from what is in the scheduled syllabus prepared by the engineering university where I am pursuing a bachelor's degree.

    • @donhousam
      @donhousam 2 года назад

      does this payload passing Facebook security bot +WhatsApp?

    • @anuragrsimha
      @anuragrsimha 2 года назад

      @@donhousam Could you consider elaborating? Your question seems to be quite unclear, I'm afraid.

  • @128bytes8
    @128bytes8 Год назад +5

    that is the most barebones POC of a botnet ever. Very cool. Like the reverse shell code.
    Keep up the great work.

  • @MrRobot222
    @MrRobot222 2 года назад +285

    Great video, but 4 points. 1. Any decent email provider will block this if you try to email it to them. So what delivery do you use? 2. Most people will have file extensions on and see it's an exe file and never open it. 3. any anti-virus will then block it, including windows defender. So this is pretty much useless unless your target is really, really, really stupid and has gone out of their way to make themselves vulnerable! 4. as you're hosting the files, forensic analysis will link it back to you. 😂 Still, giving the video a like for the PowerShell info, but this is a terrible way to do it.

    • @zSecurity
      @zSecurity  2 года назад +105

      I did say its a quick and dirty way of doing it.
      All points you mentioned are valid but can be addressed and bypassed by this very Trojan, the video will turn into a full course if I do that though

    • @shidypix8726
      @shidypix8726 2 года назад +7

      So how would you go about it ??

    • @MrRobot222
      @MrRobot222 2 года назад +26

      @@zSecurity Please don't get me wrong. I've done 2 of your courses and really enjoy your content. As I said, the powershell side is useful. Just creating a FUD backdoor these days is getting harder and harder. Veil, FatRat, Empire, Shikata ga nai are all becoming detectable by both email and AV. It can be done, just takes so much more effort these days! 😊

    • @cyyborgg
      @cyyborgg 2 года назад +5

      @@MrRobot222 Did you successfully make any undetectable backdoors yet? I tried myself but I failed miserably 😂😂

    • @MrRobot222
      @MrRobot222 2 года назад +13

      @@cyyborgg I've made several backdoors through various obfuscation techniques, but all detected, even by windows defender and the various email clients. I'm learning python with the hope of writing my own as this could be the only way forward.

  • @DariNewsTv
    @DariNewsTv 5 месяцев назад

    youre my fav youtuber rn yove teached me alot , i wish i had money to buy your courses

  • @michaelodor6788
    @michaelodor6788 2 года назад +105

    There is no video I don't learn from you.. you are simply the best

    • @mr_crapto
      @mr_crapto 2 года назад +2

      yep i agree with you buddy

    • @Yoghaaa
      @Yoghaaa 2 года назад +1

      Couldn't agree more

    • @kastakastakasta2933
      @kastakastakasta2933 2 года назад

      ruclips.net/video/7fV1_f0ipcY/видео.html :

    • @Patrickjphilippe
      @Patrickjphilippe 2 года назад

      So can somebody explain to me about what this guy does because I’m interested in this so called security defense trade but would this be under coding or just hacking

  • @user-cl1mr8ox9k
    @user-cl1mr8ox9k 8 месяцев назад

    Keep up the good solid work! I enjoy your content because it answers the questions that I have. Great job!

    • @SagarNunia-md4wn
      @SagarNunia-md4wn 4 месяца назад

      how I am gain the interface as shown in this video???

  • @ldandco
    @ldandco 2 года назад +159

    This is the main reason why on Windows I always set the file explorer to view the extensions for all files.
    This way I know if what I am executing is a exe file or an actual file.

    • @zSecurity
      @zSecurity  2 года назад +58

      There are ways to spoof the file extension too, already covered in our courses or lookup RTL override.

    • @MrRobot222
      @MrRobot222 2 года назад +16

      @@zSecurity Even Widnows Defender would still block it. Plus you can't email this to someone as any email provider would block it, so how do you deliver it?

    • @oo7posam581
      @oo7posam581 2 года назад

      @@MrRobot222 Recently the security has been increased... So manual is only option

    • @yuliyy__
      @yuliyy__ 2 года назад +1

      @@MrRobot222 Torrents

    • @MrRobot222
      @MrRobot222 2 года назад

      @ZcyberTech Antivirus would still block it

  • @wilwad
    @wilwad 2 года назад +12

    It’s these basic tricks that get users owned. Ordinary users just double click files and don’t know not to click random EXEs even with show extension turned on

  • @kbto
    @kbto 2 года назад +1

    Very informative, you earned a subscriber

  • @grey1185
    @grey1185 2 года назад +9

    I took the courses Zaid offers. They are really great and its wonderful to see you making great content

  • @decoder6878
    @decoder6878 2 года назад +2

    Nice video and awesome courses.
    I learnt a lot from your courses.

  • @jeanemeryenoga9949
    @jeanemeryenoga9949 Год назад

    This is your best tuturial for ever. Thanks à lot master. 👏👏👏

  • @dhavalsuthar1
    @dhavalsuthar1 2 года назад +4

    Sir !! You are great 😊

  • @joele2857
    @joele2857 2 года назад +2

    Thank you sir!!

  • @mastaghimau
    @mastaghimau 2 года назад +3

    Very nicely explained Zaid... Thanks a lot for your sharing....

  • @freeguy37
    @freeguy37 2 года назад

    Really helpful!

  • @tumon1237
    @tumon1237 2 года назад

    Hello Zaid, I am your big fan.I am eagerly waiting for a cyber security course from you. I know you are truly knowledgeable at this sector...

  • @khizrshaikh9902
    @khizrshaikh9902 2 года назад +3

    Thanks for this Sir/Brother

  • @shahiduae100
    @shahiduae100 2 года назад +4

    Dear Zaid
    No Doubt you are the best and first on Udemy
    I had already purchased and learned a lot from your series of Ethical hacker
    I would like to ask you if you could suggest it make video on parental care spyware
    Which is useful...
    God bless you

  • @manavgora1758
    @manavgora1758 Год назад

    Wow that was an amazing practical, i am very impressed and i subscribed

  • @juniorpillay
    @juniorpillay 2 года назад +1

    Can you show us without using empire or even Metasploit because using these frameworks are other people's programs doesn't teach us much but I do appreciate all your effort

  • @Malisha_Rasiru
    @Malisha_Rasiru 9 месяцев назад

    SSuperb Bro I have Ever Seen such a clear explanation 🤝

  • @limajrfabio
    @limajrfabio 2 года назад

    Great video! Thank you for share! I always say check the origin, sometimes is not what you think.

  • @tojabdhei4881
    @tojabdhei4881 2 года назад

    Very useful bro ❤️

  • @shellbng
    @shellbng 2 года назад +3

    one of the best teacher zaid sir💯💯💯💯

  • @kabandajamir9844
    @kabandajamir9844 2 года назад +2

    Good explanation sir

  • @unlucky9095
    @unlucky9095 2 года назад +1

    Amazing great job

  • @blackdevil5962
    @blackdevil5962 2 года назад +3

    sir i like your intro.. very well.

  • @MarkAnthonyGermanos
    @MarkAnthonyGermanos 9 месяцев назад

    Purely excellent.

  • @manicsurfing
    @manicsurfing 2 года назад

    Thanks man!

  • @einsteinwallah2
    @einsteinwallah2 2 года назад +2

    you should now do a video on how to prevent being victim of such attack or detect if you are already attacked and how to prevent its consequences

  • @Angelinajolieshorts
    @Angelinajolieshorts 7 месяцев назад

    Great person 😊

  • @beloaded3736
    @beloaded3736 2 года назад +2

    Thanks Sir Zaid. Jazakallah khair.

  • @uzi5998
    @uzi5998 2 года назад +7

    I bought your Udemy courses sir, ngl your explanation is the best.

  • @robingood2493
    @robingood2493 2 года назад +3

    Of course its exe in the final or I would scary) Useful for a few type of things maybe. Not for main cases of course.

  • @daveodie1575
    @daveodie1575 Год назад

    You are simply the best!!!

  • @lenovothinkpad9475
    @lenovothinkpad9475 2 года назад +1

    Thank you so much AS YOU CAN SEE

  • @luismarrero9293
    @luismarrero9293 2 года назад +2

    great tutorial. Always didactic and a lot of learning .Thanks

  • @krunked4949
    @krunked4949 7 месяцев назад

    So quick and ez!

  • @ibrahimgambo4904
    @ibrahimgambo4904 11 месяцев назад

    very educative

  • @GhostCrypto-tm1tl
    @GhostCrypto-tm1tl 2 года назад +1

    A detailed explanation video , thanks a lot 👍

  • @sandeepaperera1342
    @sandeepaperera1342 2 года назад

    Nice work

  • @josinjojy4268
    @josinjojy4268 2 года назад +5

    Please make a video on how to create an undetectable backdoor with C /C++ or assembly language

  • @haythemsmith6186
    @haythemsmith6186 2 года назад +2

    You are the best keel going

  • @0xazyz897
    @0xazyz897 2 года назад +2

    Amazing video Zaid, Thank you!

  • @jeremycheong8036
    @jeremycheong8036 2 года назад +2

    I bought your course. Can’t wait to start learning! 🤟

  • @postmahtoast2736
    @postmahtoast2736 2 года назад +1

    This guys so good, I feel compromised by watching this video

  • @j7beamv3-kg7lw
    @j7beamv3-kg7lw Год назад

    this tutorial helps alot man

  • @milessw1594
    @milessw1594 15 дней назад

    Nice vídeo 🎉❤

  • @jamesmary9848
    @jamesmary9848 2 года назад +1

    thank you zaid

  • @jvintsol2
    @jvintsol2 2 года назад +8

    Everybody knows not to double click an .exe file. I never use virus software. All you have to do is be aware of fake sites or files that have the wrong extensions.

  • @abhijitmondal7831
    @abhijitmondal7831 2 года назад

    Wow .. it's so amazing

  • @amoodanii
    @amoodanii 8 месяцев назад

    wow tnx 🤩

  • @Mindflayer86
    @Mindflayer86 2 года назад

    Can't... resist... THUMBNAIL!!

  • @crystoff7037
    @crystoff7037 Год назад

    thats so interesting, thank you

  • @immortalweb2018
    @immortalweb2018 2 года назад

    Nice one guru jii

  • @d_faceedit3419
    @d_faceedit3419 10 месяцев назад

    i love this video but i already know this method and yeah that's great to see that because this same method i think and make a prototype of it and it work properly also implement in ms excel that download file from internet using cmd then run that file and perform the hacking after this it upload all the data to cloud really a great video for those who are learning

  • @itsector7807
    @itsector7807 2 года назад +1

    I'm your fan broooooo

  • @Atreus21
    @Atreus21 2 года назад +1

    That's a hell of a thumbnail sir.

  • @amaanquadri2901
    @amaanquadri2901 2 года назад

    Zaid sir taken your 11 udemy courses love form India

  • @theethicalhadwani4091
    @theethicalhadwani4091 2 года назад +5

    Already covered in mr zaid's social engineering and ethical hacking cources I personally recommend them great for beginners! ❤️
    And one more thing
    Was the thumbnail a click bait?😂
    If yes well done 😝😂

  • @picku4486
    @picku4486 3 месяца назад +5

    Dear Fbi, I'm here for educational purpose only!

  • @SherinSunny-rj3py
    @SherinSunny-rj3py 2 года назад +11

    Hi zaid I am one of your students who enrolled in all of your courses which are totally best for beginners as well as , you explain complex topics in simple format so a request please make a course on
    "Learn Ethical Hacking and C programming from scratch " as well as
    "Learn software Ethical Hacking "
    Awaiting for your response
    With regards

    • @einsteinwallah2
      @einsteinwallah2 2 года назад

      sherin what is the difference between "Learn Ethical Hacking" and "Learn software Ethical Hacking"?

  • @q1ncite
    @q1ncite 2 года назад +2

    Zaid ты топовый чувак!
    Я очень рад что есть такой крутой хакер :)
    Но один минус я владею низким уровнем английского, но есть субтитры

  • @MrSavindrasingh
    @MrSavindrasingh 4 месяца назад

    That's why I always use "Show > File name extensions" as a default setting

  • @stikerjean57
    @stikerjean57 11 месяцев назад

    u r a genius !!!

  • @charliecrane253
    @charliecrane253 2 года назад +6

    Great video, obviously you would need to obfuscate your reverse shell so Windows defender doesn't catch on

    • @fletchedfps
      @fletchedfps 2 года назад

      id love to see an up to date tutorial on how to bypass av with obfuscation

    • @muaviyaharsalan4414
      @muaviyaharsalan4414 2 года назад

      @@fletchedfps same, honestly I've seen a bunch of videos but not one of them works

    • @scp-burgerking658
      @scp-burgerking658 2 года назад +1

      There is no point in obfuscating code. Obfuscating just makes it harder to read for humans. AV’s can un-obfuscate (beautify) codes in matter of miliseconds

    • @muaviyaharsalan4414
      @muaviyaharsalan4414 2 года назад

      @@scp-burgerking658 what about encrypting?

    • @scp-burgerking658
      @scp-burgerking658 2 года назад

      @@muaviyaharsalan4414 Yep, thats what you’re looking for

  • @ankitraj5ar
    @ankitraj5ar 2 года назад +1

    very useful

  • @ELLOHx3
    @ELLOHx3 2 года назад

    This is good stuff but the tutorial should have started from how the empire terminal (command & control server) was created.
    Or do you have a video for that?

  • @hadicrecket
    @hadicrecket 2 года назад +1

    Sir your videos are very good i watch your every video and get a lot of knowledge from it Sir who are you, show us by making another video in which tell how we can find free internet and free host find for free sim Internet

  • @kurimawkadongsk1652
    @kurimawkadongsk1652 2 года назад

    You're the best

  • @aitboss85
    @aitboss85 2 года назад +9

    If the user has enabled in the display option to view file extensions, they will notice easily it is an .exe file...

    • @Gareth1892000
      @Gareth1892000 2 года назад

      Yes, this is just a basic tutorial, and the method is used only with social engineering (where you trick other to click it). Otherwise, if you could write trojan and implement it purely in jpg/png file without exploit the user programme reader easily, the world security would be doomed.

    • @aitboss85
      @aitboss85 2 года назад

      @@Gareth1892000 what program are you using to gain control over victims?

    • @musshare
      @musshare 2 года назад

      most users arent critical

    • @kastakastakasta2933
      @kastakastakasta2933 2 года назад

      ruclips.net/video/7fV1_f0ipcY/видео.html

    • @kastakastakasta2933
      @kastakastakasta2933 2 года назад

      @@Gareth1892000 ruclips.net/video/7fV1_f0ipcY/видео.html

  • @matze86hh
    @matze86hh Год назад

    1:34 the Hand is great 😂

  • @robinbijo
    @robinbijo 2 года назад +2

    @zSecurity this is in case of an exe file,people will know that this is not an image file rather it is an exe file,so how can we make a backdoor behind an image?? Also how do you do it for a pdf file?

  • @lingehmuhamed5718
    @lingehmuhamed5718 5 месяцев назад

    please what tool are you using to listen for incoming connection? the interface is awesome please help me with it if anyone has an idea of the tool.. the video is great i'm recently following some of your videos in udemy it's great keep up with the good work.

  • @shootingpoint8427
    @shootingpoint8427 2 года назад +1

    Zaid is rocking now

  • @I..-_-..I
    @I..-_-..I 2 года назад

    Best channel

  • @CoryResilient
    @CoryResilient 2 года назад

    Do you have a course to bypass defender now in 2022 using this or similar methods. And is it possible to use veil powrshell bat to exe like your old video. Do the edits to the power shell options then encrypt the string even further to bypass defender now

  • @elizabethandiosa4579
    @elizabethandiosa4579 6 месяцев назад

    Thank you. I am sure feeds can be manipulated too.

  • @techwiki262
    @techwiki262 2 года назад +5

    Please make a special video for making an undetectable Trojan Using Kali. Lots of love 😊😊😊by TechWiki

  • @timinamen1217
    @timinamen1217 11 месяцев назад +1

    Actually thought that this video was a ad bc of the thumbnail

  • @2802mdah
    @2802mdah 6 месяцев назад

    Currently im doing your ethical hacking course. hope i can learn to bypass the obstacles there.

  • @davidhuh8723
    @davidhuh8723 2 года назад +1

    First thing I thought about is to rickroll a friend 😂

  • @igor-kostelac
    @igor-kostelac 5 месяцев назад

    Where can I find this hand pointer that you use in your presentation? Thank you

  • @morsalinpranto5860
    @morsalinpranto5860 2 года назад +1

    Can you make a tutorial about pegasus?

  • @SecurityTalent
    @SecurityTalent 2 года назад

    thanks

  • @bartsimpson5928
    @bartsimpson5928 2 года назад +2

    Damn Son
    Thanks A lot

  • @jamesrushforth1026
    @jamesrushforth1026 Год назад

    So cool mate never seen anything like it can this be used on phone too iphone or android the newer ones???

  • @maristdavid5676
    @maristdavid5676 2 года назад

    Thanks bro

  • @Tec_S3cr3ts
    @Tec_S3cr3ts 7 месяцев назад

    Maravilho! I loved it

  • @memedythinker
    @memedythinker 2 года назад

    hello sir please make a full course on api hacking jwt hacking and owasp top 10

  • @US5NAR
    @US5NAR Год назад

    thanks for an idea! Now it will be a PS with invoke-webrequest !!! It's really cool! Thanks for short and simple solution!

  • @harshavardan9054
    @harshavardan9054 2 года назад +3

    Hey I have a doubt when the victim clicks in that image will if trigger the Security malware of the victim or it does not

  • @user-hp1zj2qu6j
    @user-hp1zj2qu6j Год назад

    that one me making a system speed destroyer using a loop forkbomb with a red color skull art too in a batch extension file:

  • @Jaiswalkatul
    @Jaiswalkatul 2 года назад +6

    The moment you execute Invoke Expression , any EDR solution will detect and block it

  • @anonymous4911
    @anonymous4911 2 года назад +1

    Any Video to the kali machine he uses?

  • @johnsam3240
    @johnsam3240 2 года назад +1

    Nice one but what about windows defender or any other antivirus detection??