• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

How to Code a Powershell RAT for Windows Spying (1 Viewer)

Currently reading:
 How to Code a Powershell RAT for Windows Spying (1 Viewer)

Recently searched:

Capy987

Member
LV
1
Joined
Jan 27, 2023
Threads
11
Likes
31
Awards
4
Credits
1,707©
Cash
0$
  • Social Engineering
  • OS (Operating Systems)
  • Typing (a must have)
  • Code / Github Open-source
  • IDE / Reverse-engineering
  • Types of hackers.
Lets begin!
So, starting from rule 1: Social Engineering. As famous anti-virus dev John McAffee states, 95% of hacking includes social engineering, the other 5% is coding and scripting. Some people call us skids, etc. because we have extreme knowledge about computers, etc.
SE includes graphic design, media design, and other forms of content to lure in people to click a link, download, or something similar.
Next talking point, OS (Operating Systems) are the main software of any conventional computer, desktop, phone, or TV. It's the kernel, the barebones OS. I have a funny saying, kernel-exploits are the best exploits.
Some include, Windows, iOS, Android, but hackers favorite is Ubuntu and other linux distros. I personally do my hacking on Ubuntu due to it being open-source and easy to customize and typing feels like a breeze. Speaking of typing, a great website to practice is MonkeyType https://monkeytype.com
If you can code an incredible rootkit, you can own the world. (Literally)
Typing is important for coding software, writing text, etc., but us hackers spend 70-80% of our time typing.
Some common coding terms include things like C2 (Control-servers), SSL, TCP (Port 443, 445), Tor, VPN's, proxy, HTTP & HTTPS protocols etc. << Cybersecurity in a nutshell
There are three teams when it comes to hacking and cybersec, blue (offense), red(defense), and purple(developers / development). Remember, cybersecurity is a warground, think of it like a battleground for testing malware and such. Virtual machines are containerized OS (Windows, iOS, etc.), that run on a computer for cybersec testing.
LEARN OPEN-SOURCE. This is important, because otherwise you can't share your cybersec vulnerabilities, malware, etc., so use Github. Github LINK. Make an account, and backup your code always to github. This is because you might need to clean install windows, linux, or ubuntu, and losing code is NOT fun.
Some common file formats & names:
  1. .jpg (image)
  2. .png (image)
  3. .exe (executable windows file)
  4. .iso (burnable media file, windows, ubuntu, etc.)
  5. .ps1, .psd1, .psm1 (Powershell files)
  6. .NET Framework
  7. .mp4 (video files)
  8. .html, .css, .js, .php (Basic Markdown languages, for websites)
  9. .py, node.js, go, rust, etc. (Basic command-line languages for backend / server infrastructure)
  10. .wav (music)
These are just some common file types for computers, mobile phones like android use different ones like .apk, and java, iOS uses Swift, etc.
Documentation is available for all of this online, the other 50% of hacking is googling, using stackoverflow, and duckduckgo, etc.
Anyways, have fun! :)

The title was sort of clickbait, but it's a hacking guide, take it as you will. ;)

Link:
 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom