Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network

Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This video tutorial demonstrates how to create and transfer a Trojan using the Zorica 2 framework on a Kali Linux system to infect a Windows 10 machine. It covers downloading and setting up the framework, creating a multi-encode payload to bypass Windows Defender, and transferring the payload using a Python server. The video concludes with executing the payload on Windows 10 and establishing a meterpreter session, setting the stage for gathering user login credentials in the next tutorial.

Read more

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What operating systems are used in the tutorial for creating and transferring Trojans?

Kali Linux and Windows 10

Ubuntu and Windows 7

MacOS and Windows 8

Fedora and Windows XP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Zorica 2 framework in the tutorial?

To create a secure network

To install antivirus software

To update the operating system

To generate fully undetectable payloads

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What command is used to provide execution permission to the Zorica 2 script?

chmod 644 Zorica2.sh

chmod -r Zorica2.sh

chmod 777 Zorica2.sh

chmod +x Zorica2.sh

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a multi-encoded payload do?

It compresses the payload

It duplicates the payload

It encrypts the payload multiple times

It deletes the payload

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which port number is used to transfer the payload using a Python server?

443

21

8080

8000

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the meterpreter session in the tutorial?

To create a backup

To install software

To access the target system's command prompt

To update the system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the significance of bypassing Windows Defender in the tutorial?

To allow the payload to execute without being blocked

To ensure the payload is detected

To uninstall Windows Defender

To update Windows Defender