This is pretty amazing, I want to know how it works on a deeper level - since the target does not need to have discord installed - how does it communicate back with the discord servers/bot in the form of a reverse shell?
Well Done but i face this problem During Build the Backdoor 0148:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems of course i do not know what is the Relation between NTLM Protocol and the Backdoor ?
So the only way this works is if the target user chooses to download an unsafe file. This would be much better with a method for covertly uploading and executing on the target machine.
I keep getting problems with whine somehow. When I type "build" to make the backdoor, then afterwards type "y" to confirm it. I just get an error message Can some1 help?
while working on this my Kali machine restart and it request for my password. and my password didn't work i have been logged out of my machine and i can't access my work
@@BarcaGlazermy boy stays offline and I don’t know how to run the exe file he just jumps to getting the file name to opening it I feel like I missed a step
No I tried it yesterday and the signatures are definitely being picked up by defender.. Can't even run the exe on my own server without it getting flagged and deleted instantly
The back door itself yes just like any other backdoor, so you have to modify it yourself to make it bypass AV, but the communication that the backdoor uses looks identical to normal communication generated by Discord.
@@zSecurity Means the PAYLOAD CREATED should be OBFUSCATED by US and then payload will be undetectable to AV & finally send it to the VICTIM MACHINE and enjoy. Is that what you mean?
There's a error when I'm installing on Kali Linux . After starting the setup it appears a tab to authorize updates in certains tools. After that my kali goes black and I can't even type there. Anyone knows how to fix it?
@@cmdr.yo bro if your there pls help me ok listen I did all the stuff but I see the exe thing but when I send it it doesn’t show as a file what do I do?
@@RareVampire-c6s Oh you aint. The rest of the comments are full of them and his recent video on using storm breaker is full of bots referring to users about how good the product is and stating the wrong channel name.
Because if someone sends this file to exploit their computer, usually people that have some knowledge run it on a virtual machine before installing it in there real device to check if the file is explotive or not and get tricked when it does not exploit on VM.
Hi? Im new here did you know how to remove secret camera on screen im so suspicious on my own phone i swap it in my iphone i don't know it have a hidden camera ike cheap camera put in my phone
As shown that CMD command was run on the TARGET through DISCORD; so can we also run the POWERSHELL COMMANDS same as the CMD COMMANDS as shown? BTW Lots of LVOE from INDIA❤❤
Sir please do i have installed the kali machine again and i still get locked out after asking for password "T**r" incorrect again... sir do i need to download a different kali linux instead of the private one you shared in your Ethical H lecture ?
I was near Dublin a few days ago. It was very nice! 👍🏼
As always you guys are killing it 🎉
Happy teachers day love from Pakistan 🇵🇰 ❤❤❤❤
amazing ZAID and the Discord C2 developer!
Great content
A bot comment
Excellent 🎉
I knew it these are botted comments
Very good !
A bot comment
@@ZxWhisper i'M NOT A BOT
thank you so much sir g 😍
Can you do a video using telegram bot and Python code or metasploit
thanks for the video. could you make more like this with the github and telegram versions?
I can tech you for telegram versions
This is pretty amazing, I want to know how it works on a deeper level - since the target does not need to have discord installed - how does it communicate back with the discord servers/bot in the form of a reverse shell?
This is soo Good , keep up the videos , give me a free course plzz 😀
Well Done but i face this problem During Build the Backdoor 0148:err:ntlm:ntlm_LsaApInitializePackage no NTLM support, expect problems
of course i do not know what is the Relation between NTLM Protocol and the Backdoor ?
this man just put kalopisis tool after years
your the best
How do you get the terminal thing
So the only way this works is if the target user chooses to download an unsafe file. This would be much better with a method for covertly uploading and executing on the target machine.
can we do in windows as well?
bro it is hua-wei.. not hawawi 🤣 but thanks for the laughes.. enjoying your course on udemy.. hope to get some knowlegde from it.
18:12 Honestly I hope people didn't find this useful. This is scary easy to use
I have studied the CCNA. Will I need additional networking knowledge for penetration testing and red teaming ?
I don't think so, it's all about where to use that u learn, go for what u want, every new step shows a new lesson to learn.
Yeah, I don’t think so. You might need extra knowledge as you go and learn about new topics, but that should be easily attainable.
@@zSecurity how do i change my colors on linux
My target pc is 64bit, how to change 32bit to 64 bit on the payload?
But telegram bot is the best one
Which?
Do tell.....😏
@@CRAZY-lb5vc i'm talking about if you going about to devalope your own
@@CRAZY-lb5vc You can devalope your own
@@CRAZY-lb5vc Toxic Eye
please help me with error :"Traceback (most recent call last):
File "main.py", line 1, in
ModuleNotFoundError: No module named 'discord'"
reinstall discord
could you find a better one and do a tutorial? this one doesn't work sometimes and have bunch of errors.
Can the executable be reused? Because I don't see it working when I try it again after a day.
Is your store not selling the whid cactus' anymore ?
It’s out of stock for the moment, will be back in stock shortly.
@@zSecurity 👍
Security should I be connected to my internet while I’m in kali Linux
First!!!
Welldone Boss!!
I keep getting problems with whine somehow. When I type "build" to make the backdoor, then afterwards type "y" to confirm it. I just get an error message
Can some1 help?
Can this also work on phones
while working on this my Kali machine restart and it request for my password. and my password didn't work
i have been logged out of my machine and i can't access my work
Stop lying dummy
We need how to keep a payload undetectable
not working . I will be happy if from time to time you can come and check the comment sessions and try to answer us Plz
How about the shutdown command through cmd?
Why is my bot offline
Didn't u add ur token to it?
@@BarcaGlazermy boy stays offline and I don’t know how to run the exe file he just jumps to getting the file name to opening it I feel like I missed a step
Give the code to inject, what if I have to add the code in any other executable?
how did you install python3.8.9 from exe
is the backdoor undetectable by windows defender?
No I tried it yesterday and the signatures are definitely being picked up by defender.. Can't even run the exe on my own server without it getting flagged and deleted instantly
how do u open the backdoor on windows
Intresting
Please Give Lectures about Game Hacking
can't it be easily detected by Av?
The back door itself yes just like any other backdoor, so you have to modify it yourself to make it bypass AV, but the communication that the backdoor uses looks identical to normal communication generated by Discord.
@@zSecurity Means the PAYLOAD CREATED should be OBFUSCATED by US and then payload will be undetectable to AV & finally send it to the VICTIM MACHINE and enjoy.
Is that what you mean?
So do they both need to be in the same discord channel too? @zSecurity
is anything available same for android Device ?
err:winediag:ntlm_check_version ntlm_auth was not found how to fix it plzz help me
how about how to create a forever phishing link
After a long❤
ur a bot aint u
how can I make it not recognizable from antivirus?
I can't get the dist directory
It is saying the application did not respond, does anyone know why that is?
How do you detect this attack? What free options would you recommend if any?
Use Linux ;)
@@zSecurity well what if I have windows lol. How should I scan the file?
@@zSecurity but seriously there are lots of hackers ina coding server and I may have clicked something:) using windows
I AM STRONGLY UNHACKABLE... VERY STRONG DEFENSE...
There's a error when I'm installing on Kali Linux . After starting the setup it appears a tab to authorize updates in certains tools. After that my kali goes black and I can't even type there. Anyone knows how to fix it?
Interesting 🧐
Bot
i m getting an error unable to open wine32
its showing install it when im installing it its giving an error
Same and after completing all steps I found all directories except dist dist directory
I generated the back door but no signal when I run it, tried 3 times with 3 different accounts still nothing
I’m having the same issue my boy stays offline I think that has something to do with it idk how to make my bot go live
Did you manage to fix the issue?
did everything yet there is no commands for the bot and nothing happens when the file is run
how you get the file
@@XxIcezZLol wdym? you make it
@@cmdr.yeah I got the file dystopian.exe but I don’t know how to run it he doesn’t show that
@@cmdr.yo bro if your there pls help me ok listen I did all the stuff but I see the exe thing but when I send it it doesn’t show as a file what do I do?
antivirus removes it instantly so if someone downloads it it wont work because it will be removed
Amazing
ur a bot
@@ZxWhisper really?
@@RareVampire-c6s Oh you aint. The rest of the comments are full of them and his recent video on using storm breaker is full of bots referring to users about how good the product is and stating the wrong channel name.
@@RareVampire-c6s And if its so amazing, u got it to actually work?
@@ZxWhisper it's a good video . If you want to learn something, go and buy some courses. youtube videos are just an idea .
I didn't find dist directory in dystopia-c2
same
@@Jeff-st2fkwhat is your kali linux 64bit or 32bit
Can you make a video about how to hack the Wi-Fi?
how do i make file size smaller, dont have discord nitro.
how did you get the file bro?? pls tell me it just says distopia.exe where the file i send poeple
Please bro need a video how to run beef browser exploitation framework remotely for free Pls 😢
chokran azbi
bro why it detects vm and not run I want to run it on my win7 VM for testing but you tell me not to do so. I can't put my real win10 PC in danger.
Because if someone sends this file to exploit their computer, usually people that have some knowledge run it on a virtual machine before installing it in there real device to check if the file is explotive or not and get tricked when it does not exploit on VM.
please next video like this on windows not linux plssssssssss
why dont upload the backdoor to virustotal
how do i turn it off
I AM STRONGLY UNHACKABLE... VERY STRONG DEFENSE...
Get a life
@@lolononojay9010 Invite Death after failure to hack me
😂😂@@lolononojay9010
amazing
How to install wine32 to 64bin its not installing
Do you find a solution?
Install win32 using sudo apt also install old version of python 3.8.9 that’s what gone make it work correctly. Thank me later
is it possible to use this method to hack smartphone
Does anyone find dist directory?
nope
keylog doesnt work anybody know how to fix it?
Can i merge this with my custom pay*7_d
Hello
Nobody Can Hack Me in the whole world! I challenge everyone here
😂
why would the victim voluntarly download de file dystopia.exe?
i have problem with Wine, somebody can help me?
it not work it says something about no "prettytable"
How lovely 😈
ur a bot
It fails to install wine😢
Someone please help my WhatsApp was hacked and otp locked I can't get back in
I can help you
Bro some people don't use telegram and discord.
Has anyone managed to do it?
I didn't there is no dist directory
Please make a video on remotely access any Android or any device using kali linux and also make 1 more video hack gmail I'd and password
Hi? Im new here did you know how to remove secret camera on screen im so suspicious on my own phone i swap it in my iphone i don't know it have a hidden camera ike cheap camera put in my phone
"Invalid scopes provided for user installation"
How to protect ourself from this pls?
That is indeed very interesting. But... how do I get the exe-File to the target machine? Did I miss a step here?
skill issue tbh
Social engineering usually using a fake email, sms, …etc all of which is covered here and in our courses.
idk too
@@zSecurity So the usual stuff. Thanks.
@@connerhaynes2197do you you know how to open an exe dile
1st comment 🎉
1817 Price Crossroad
Will you be my brand partner
Mariela Track
Its not working
0417 Marks Prairie
As shown that CMD command was run on the TARGET through DISCORD; so can we also run the POWERSHELL COMMANDS same as the CMD COMMANDS as shown?
BTW Lots of LVOE from INDIA❤❤
I really want to marry this guy T_T
Sir please do i have installed the kali machine again and i still get locked out after asking for password "T**r" incorrect again... sir do i need to download a different kali linux instead of the private one you shared in your Ethical H lecture ?
Android hacking video ❤