exploit a system outside a network :)
Save the file as fud.sh
And set the permission to Execute :
As soon as the the payload is executed on the Victims machine
it will automatically migrate to explorer.exe Process
The payload is almost undetectable from most of the virus Engines!!!!
Code : |
|
Code : |
|
Save the file as fud.sh
And set the permission to Execute :
Code : |
|
As soon as the the payload is executed on the Victims machine
it will automatically migrate to explorer.exe Process
The payload is almost undetectable from most of the virus Engines!!!!
Post a Comment