Search Header Logo
Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network

Bug Bounty Program Certification 6.4: Create a Trojan and Infect Machines in Network

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Hard

Created by

Wayground Content

FREE Resource

This video tutorial demonstrates how to create and transfer a Trojan using the Zorica 2 framework on a Kali Linux system to infect a Windows 10 machine. It covers downloading and setting up the framework, creating a multi-encode payload to bypass Windows Defender, and transferring the payload using a Python server. The video concludes with executing the payload on Windows 10 and establishing a meterpreter session, setting the stage for gathering user login credentials in the next tutorial.

Read more

1 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What new insight or understanding did you gain from this video?

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?