Ransomware Attack Simulation

Ransomware Attack Simulation

Lockard

2 года назад

105,351 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Zack Matheuy
Zack Matheuy - 17.09.2023 04:31

how did you get access to the targets computer?

Ответить
Golam Mohammad Rabbani
Golam Mohammad Rabbani - 27.06.2023 21:24

What kind of mail you are using ? How can I use it ? Is it free ?

Ответить
Gernot
Gernot - 20.06.2023 16:26

does kaspersky allow opening the infected word-doc in the beginning of the vid? i dont think so so its preventing the ransomware attack?

Ответить
Apit Aremore
Apit Aremore - 17.06.2023 05:29

how to remove ransomware??

Ответить
Sree Rahul
Sree Rahul - 30.05.2023 09:31

Hi bro
If a pc is infected with ransomeware virus how to decrypt it please do a video

Ответить
Mohamed Amjath
Mohamed Amjath - 05.05.2023 23:06

Hi, can i contact you pls

Ответить
Jay Dave
Jay Dave - 28.04.2023 10:29

Hey! It's an absolute amazing video..but how can i get this codes..for my Ransomware project?can u reply pls.

Ответить
Mario
Mario - 25.04.2023 00:53

So you don’t go to jail y’all, hack a vm lol

Ответить
marvino kapo
marvino kapo - 11.04.2023 03:35

Hey mate the Infection-Simulation document that you used to maintained the connection and to upload the malware in the victim machine where did you get it from? (Educational purpose). Thanks.

Ответить
Conan
Conan - 29.03.2023 11:37

Nice video, explanation and demonstration.

I think you should try again against a computer who has a paid license of antivirus (e.g ESET etc).
The free version Windows defender has nothing in order to defend any attack.

Ответить
Dan Wolf
Dan Wolf - 14.03.2023 05:54

Instead of “hacker” you should say cyber criminal.

Ответить
Haroun Rasheed
Haroun Rasheed - 08.02.2023 19:08

HI! I have been trying to simulate ransomware traffic for testing a countermeasure but I couldn't. How can I simulate wannacry ransomware traffic?
Best Regards

Ответить
zilver fox
zilver fox - 26.01.2023 19:18

i assume you made a backdoor first, just how do you crypt it in kali linux plus exploit?

Ответить
Abeu Temirlan
Abeu Temirlan - 19.12.2022 19:39

Hello Lord, I have final project tomotrow, and I need to demonstrate this attack to get bonus points, I really need this. Can you help me, plsss?!!

Ответить
📬☎️Milton_Codes on Instagram
📬☎️Milton_Codes on Instagram - 02.12.2022 19:14

👆👆I'll always be thankful to this guy for helping me with my files, he is reliable

Ответить
Robert Clark
Robert Clark - 14.11.2022 06:00

who would use windows ge

Ответить
Ron würde sagen : DAS IS ES
Ron würde sagen : DAS IS ES - 02.11.2022 10:04

How do you make this Word Document without Makros?

Ответить
Contact☎️  MOUSE_CODES on instagram
Contact☎️ MOUSE_CODES on instagram - 30.08.2022 04:24

All thanks to the name on my bio🔝🔝, all my files were affected by the ransomware but he has successfully helped me to decrypt them, you're indeed awesome.

Ответить
MrGermanyHD
MrGermanyHD - 10.08.2022 01:33

How did you make it without WinDef or AV noticing or alarming? Can u tell me in 1-2 sentences how this exploit works and what I need to do? (educational purposes only)

Ответить
Electra Gamming & Tech
Electra Gamming & Tech - 13.07.2022 18:15

give me the google sheet documents

Ответить
Text GLOCYBER ON INSTAGRAM
Text GLOCYBER ON INSTAGRAM - 05.07.2022 07:28

I was able to reach 🔝👆👆 GLOCYBER and they could fix my storage and recovery my files.

Ответить
Text GLOCYBER ON INSTAGRAM
Text GLOCYBER ON INSTAGRAM - 05.07.2022 07:28

I was able to reach 🔝👆👆 GLOCYBER and they could fix my storage and recovery my files.

Ответить
Text GLOCYBER ON INSTAGRAM
Text GLOCYBER ON INSTAGRAM - 05.07.2022 07:28

I was able to reach 🔝👆👆 GLOCYBER and they could fix my storage and recovery my files.

Ответить
Text GLOCYBER ON INSTAGRAM
Text GLOCYBER ON INSTAGRAM - 05.07.2022 07:28

I was able to reach 🔝👆👆 GLOCYBER and they could fix my storage and recovery my files.

Ответить
Udoh Pele
Udoh Pele - 23.06.2022 15:05

Thanks for this demo. On question please, if the user is not a local admin and is unable to run the file after clicking, will the hack still be successful?

Ответить
👉dee-hack11 on Instagram👈
👉dee-hack11 on Instagram👈 - 18.06.2022 04:52

¡ Excellent video! Yo perdí mi iPhone y, aunque ya tiene varios años que pasó, a video así en su momento hubiera ayudado muchísimo me. Voy a compartir esto con mis amigos y c ... Read more☝️☝️☝️.

Ответить
👉dee-hack11 on Instagram👈
👉dee-hack11 on Instagram👈 - 18.06.2022 04:51

¡ Excellent video! Yo perdí mi iPhone y, aunque ya tiene varios años que pasó, a video así en su momento hubiera ayudado muchísimo me. Voy a compartir esto con mis amigos y c ... Read more☝️☝️☝️.

Ответить
Rafael Sandoval
Rafael Sandoval - 17.06.2022 17:28

do you have a video where you put the malicious code into the macro file? Thank you

Ответить
Tarone Fields
Tarone Fields - 14.06.2022 23:00

You can message SCOTTS_HACK

Ответить
Tarone Fields
Tarone Fields - 14.06.2022 23:00

You can message SCOTTS_HACK

Ответить
👉SEARCH 9MAXBYPASS ON INSTAGRAM👈
👉SEARCH 9MAXBYPASS ON INSTAGRAM👈 - 09.06.2022 05:28

☝️All affected persons with the ransomware virus extension can contact us for perfect solutions.

Ответить
DM ⏩GLOBALBYPASS⏪ON IG
DM ⏩GLOBALBYPASS⏪ON IG - 22.05.2022 06:14

⤴️much appreciation to him above for his tremendous efforts toward decrypting my affected files. He gave me my special 32 digit decryption key 🔑 which helped me recover my files.

Ответить
Contact☎️GLOBALBYPASS on Instagram
Contact☎️GLOBALBYPASS on Instagram - 22.05.2022 04:30

I was hit on my device, I was finding difficulties getting my files back until I came across scott, the above mentioned social media account that got me my special decryption key.

Ответить
Go to globalbypass on Instagram
Go to globalbypass on Instagram - 22.05.2022 01:49

I watch the video but still couldn’t do it myself until he came to my aid👆(the above bio on social media). Thank you

Ответить
👉www•ɢʟoᴄʏʙᴇʀ•tech
👉www•ɢʟoᴄʏʙᴇʀ•tech - 15.05.2022 01:29

👆👆as he has done well and his intelligence has been confirmed rightful and accurate. He did all necessary implementation and offer a good decrypting idea. Am sure if you Glo cyber, then you are save.

Ответить
THE HACKER’S PODCAST
THE HACKER’S PODCAST - 08.05.2022 09:44

Start with the full video so I learn how to create the payload and listener

Ответить
SamuraiJack
SamuraiJack - 04.05.2022 18:51

Thank you for everyting bro, have a good job.

Ответить