cosminkent Posted May 15, 2013 Report Posted May 15, 2013 Make Your Virus FUDhttp://3.bp.blogspot.com/-uPZ69RUzR4A/UWZfdLOJ3II/AAAAAAAADEo/7c6lMymrnNw/s640/13047.pngDownload: ?? ????????????????? ?? ??????? ????? ????????? ? ????HINT: Daca va place cafeaua Arabica!VT: https://www.virustotal.com/en/file/e3827e7fcc1419c232e2466cb90ce74b64137313e21f1fec14cf0b035d13ab1e/analysis/1368639139/Source: HA Quote
rockeru133 Posted May 15, 2013 Report Posted May 15, 2013 Ma blochez la partea cu BACKTRACK OS , cum procedez ?! Quote
nistetarani1 Posted May 15, 2013 Report Posted May 15, 2013 fratilor va cryptez eu pt 5$ fud fud 0/46 Quote
yoyois Posted May 15, 2013 Report Posted May 15, 2013 Pur si simplu criptezi de 4 ori serverul?Nu sunt "efecte" secundare ?Multumim oricum de informatie. Quote
cosminkent Posted May 15, 2013 Author Report Posted May 15, 2013 Ma blochez la partea cu BACKTRACK OS , cum procedez ?!Trebuie sa faci un live cd cu Backtrack (linux)Downloads Quote
rockeru133 Posted May 15, 2013 Report Posted May 15, 2013 Multumesc . Si thanks pt share . O sa instalez BackTrack pe-un VirtualBox . Quote
mafia27 Posted May 15, 2013 Report Posted May 15, 2013 (edited) la mn ramane asa dupa aceasta comanda : root@bt:~/Desktop# msfencode -i /root/Desktop/server.exe -t raw -o /root/Desktop/server2.exe -e x86/shikata_ga_nai -c 10 .... Edit: am asteptat ..si degeaba ramane la acest pas..nu merge mai departe...sunt curios daca cuiva ii functioneaza metoda Edited May 15, 2013 by mafia27 Quote
Maximus Posted May 15, 2013 Report Posted May 15, 2013 (edited) Ti-am dat Like, dau +rep dupa ce-mi vad serverul fud Mda, sta la infinit ...CTRL+CC/opt/metasploit/msf3/lib/msf/core/encoder.rb:311:in `do_encode': Interrupt from /opt/metasploit/msf3/lib/msf/core/encoder/xor_additive_feedback.rb:60:in `find_key' from /opt/metasploit/msf3/lib/msf/core/encoder.rb:429:in `obtain_key' from /opt/metasploit/msf3/lib/msf/core/encoder.rb:256:in `encode' from /opt/metasploit/msf3/msfencode:250:in `block (2 levels) in <main>' from /opt/metasploit/msf3/msfencode:247:in `upto' from /opt/metasploit/msf3/msfencode:247:in `block in <main>' from /opt/metasploit/msf3/msfencode:237:in `each' from /opt/metasploit/msf3/msfencode:237:in `<main>' Edited May 15, 2013 by Maximus Quote
mad93 Posted May 15, 2013 Report Posted May 15, 2013 Daca tot ne ajutam aruncati un ochi si aici ? ????? ? ????? ? ?????????? ?? ?? ? ?? ??? ??????? ?? ??? ? ? ??? ? ???????? ????? am docul de ceva timp Quote
mafia27 Posted May 16, 2013 Report Posted May 16, 2013 Daca tot ne ajutam aruncati un ochi si aici ? ????? ? ????? ? ?????????? ?? ?? ? ?? ??? ??????? ?? ??? ? ? ??? ? ???????? ????? am docul de ceva timpaceeasi problema si la doc-ul tau..tot dupa acea comanda ramane asa la infinit..iar daca inchizi procesul (ctrl+c)C/opt/metasploit/msf3/lib/msf/core/encoder.rb:311:in `do_encode': Interruptfrom /opt/metasploit/msf3/lib/msf/core/encoder/xor_additive_feedback.rb:60:in `find_key'from /opt/metasploit/msf3/lib/msf/core/encoder.rb:429:in `obtain_key'from /opt/metasploit/msf3/lib/msf/core/encoder.rb:256:in `encode'from /opt/metasploit/msf3/msfencode:250:in `block (2 levels) in <main>'from /opt/metasploit/msf3/msfencode:247:in `upto'from /opt/metasploit/msf3/msfencode:247:in `block in <main>'from /opt/metasploit/msf3/msfencode:237:in `each'from /opt/metasploit/msf3/msfencode:237:in `<main>'....deci nu cred ca functioneaza metoda.. Quote
TheKing69 Posted May 17, 2013 Report Posted May 17, 2013 Dati un pm si va cryptez eu cu 3$ LR ... FUD... Quote
yoyois Posted May 17, 2013 Report Posted May 17, 2013 Dati un pm si va cryptez eu cu 3$ LR ... FUD...A zis cineva ca vrea sa cumpere?Nu iti mai face atata reclama. bravo tie. Si eu am un crypter ud 2/36.Era vorba de metoda in metasploit. Quote
l3g3nd95 Posted October 28, 2013 Report Posted October 28, 2013 si eu am incercat... am reusit sa ajung la capat dar cand deschid final.exe in windows imi apare eroarea asta: Quote