UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
mdmz_book.pdf
70.4 MB
MD MZ

The result of self-research and
investigation of malware development
tricks, evasion techniques and
persistence

Support: https://cocomelonc.github.io/book/2022/07/16/mybook.html
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸ–₯ Types of malware

▢️Let's start by discussing some of the most common types of malware. There are many different categories, but we can start by talking about viruses, worms, and trojans. Viruses are pieces of code that attach themselves to other programs and replicate themselves, often causing damage in the process. Worms are similar to viruses, but they are self-replicating and can spread across networks without human intervention. Trojans are pieces of software that appear to be legitimate but actually have a hidden, malicious purpose.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸšͺ Backdoors
πŸšͺ

🟑Malware with a backdoor capability allows an attacker to breach normal authentication or encryption in a computer, product, or embedded device, or sometimes its protocol. Backdoors provide attackers with invisible access to systems, enabling them to remotely control the victim’s machine for various malicious activities.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
⬇️ Downloaders

🟑Downloaders are a type of malware that, once installed on a victim’s system, downloads and installs other malicious software. These are often used in multi-stage attacks where the downloader serves as a means to bring in more advanced, and sometimes tailored, threats onto the compromised machine.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸ‡¬πŸ‡· Trojan

🟑Trojan malware is malicious software that disguises itself as legitimate software. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy. Trojans can allow cyber-thieves and hackers to spy on you, steal your sensitive data, and gain backdoor access to your system.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸ€ Remote access trojans (RATs)

🟑RATs provide the attacker with complete control over the infected system. They can be used to install additional malware, send data to a remote server, interfere with the operation of devices, modify system settings, run or terminate applications, and more. RATs can be particularly dangerous because they often remain undetected by antivirus software.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸ₯· Stealers

🟑These types of malware are designed to extract sensitive data from a victim’s system, including passwords, credit card details, and other personal information. Once the data is stolen, it can be used for malicious purposes such as identity theft or financial fraud, or even sold on the dark web.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸ–₯ Bootkits

🟑A bootkit is a malware variant that infects the master boot record (MBR). By attacking the startup routine, the bootkit ensures that it loads before the operating system, remaining hidden from antivirus programs. Bootkits often provide backdoor access and are notoriously difficult to detect and remove.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
◀️ Reverse shells

🟑In the context of a reverse shell, the attacking machine obtains communications from the target machine. A listener port is present on the attacking machine, through which it obtains the connection, providing a covert channel that bypasses firewall or router restrictions on the target machine. This can provide command-line access and, in some cases, full control over the target machine.
Please open Telegram to view this post
VIEW IN TELEGRAM