Jan 24, 2018, 15:46 pm
Jan 24, 2018, 17:33 pm
You need wood and a lot of greeks.
Jan 24, 2018, 18:38 pm
Try playing around with Kali Linux or Parrot Security OS. I have never built a trojan so I can't give advice on that, but for network hacking use those two distros.
Jan 24, 2018, 21:30 pm
Network pen and compiling Trojans? Maybe start with understanding firstly why you want to pen networks. Then think of the results of being caught for you. Then start reading. Understand why your question shows your lack of basic knowledge.
Maybe re-evaluate your motivations both present and for future.
Useful links:
https://www.sans.org/course/network-pene...gKYk_D_BwE
https://www.computersecuritystudent.com/...index.html
https://www.udemy.com/learn-ethical-hack...atchtype=e
https://en.wikipedia.org/wiki/Cloudflare
https://blog.rapid7.com/2017/02/24/cloud...loudbleed/
Hope these help you gain understanding that what you see, hear and see on internet is not real world. You want to learn? Use the best tool in world. Your brain.
With respect.
Maybe re-evaluate your motivations both present and for future.
Useful links:
https://www.sans.org/course/network-pene...gKYk_D_BwE
https://www.computersecuritystudent.com/...index.html
https://www.udemy.com/learn-ethical-hack...atchtype=e
https://en.wikipedia.org/wiki/Cloudflare
https://blog.rapid7.com/2017/02/24/cloud...loudbleed/
Hope these help you gain understanding that what you see, hear and see on internet is not real world. You want to learn? Use the best tool in world. Your brain.
With respect.
Mar 28, 2023, 09:21 am
Exploit kits i-e These are pre-packaged sets of tools and code that can be used to create and distribute Trojans. Exploit kits take advantage of vulnerabilities in software or operating systems to install Trojans without the user's knowledge.