Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network

Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Quizizz Content

FREE Resource

This video tutorial demonstrates how to create and transfer a Trojan using the Zorica 2 framework on a Kali Linux system to infect a Windows 10 machine. It covers downloading and setting up the framework, creating a multi-encode payload to bypass Windows Defender, and transferring the payload using a Python server. The video concludes with executing the payload on Windows 10 and establishing a meterpreter session, setting the stage for gathering user login credentials in the next tutorial.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF