spyware tool - tugas kuliah hacking
Summary
TLDRThe transcript explains the installation and configuration of two programs, 'Jonin' and 'Ninja', used for hacking or spyware activities. The process involves downloading the appropriate versions for the target machine, disguising the software, and connecting the two machines to execute remote commands. The hacker manipulates file names and configures ports to facilitate the breach. While the video outlines technical steps for the illicit use of these programs, it's crucial to emphasize the importance of ethical hacking practices and the legal implications of such activities.
Takeaways
- 😀 The transcript discusses the use of two programs, Jonin and Ninja, for spying and hacking purposes.
- 😀 Jonin is installed on the attacker's computer and used to launch attacks on the target system.
- 😀 Ninja is installed on the target's Windows system, which is then manipulated for malicious activities.
- 😀 The target's Ninja program can be disguised by renaming it (e.g., as Photoshop) to avoid detection.
- 😀 The installation paths and configurations of the Ninja program are customized to ensure successful operation on the target machine.
- 😀 The configuration includes setting the correct ports, IP addresses, and file paths for successful communication.
- 😀 The attacker's system can be set to either a local IP or a public IP, depending on the network setup.
- 😀 The Ninja program is installed on the target system after changing its name and modifying its config file.
- 😀 Once installed, the attacker verifies the connection and executes commands through the terminal to control the target system.
- 😀 Files can be uploaded to the target machine remotely using simple terminal commands like 'upload' and 'copy'.
Q & A
What is the primary purpose of the software or program discussed in the transcript?
-The software or program discussed is designed for use as spyware, allowing a hacker to control and manipulate a target's computer remotely.
Which two programs are mentioned for downloading in the transcript?
-The two programs mentioned for downloading are Jonin and Ninja.
What is the purpose of the Jonin software in the context of the transcript?
-Jonin is used by the hacker to initiate the hacking process and connect to the target system. It allows the hacker to control the system remotely.
What is the role of the Ninja software in the transcript?
-Ninja is installed on the target computer and serves as the tool that facilitates the hacking actions. It can be disguised to look like other programs, such as Photoshop.
What operating systems are mentioned for the installation of Jonin and Ninja?
-Jonin is used on a Mac computer, while Ninja is installed on a Windows-based target computer.
How is the Ninja software disguised to avoid detection by the target?
-The Ninja software can be renamed to resemble legitimate applications, such as Photoshop, to avoid suspicion from the target.
What configuration steps are involved before installing the Ninja software on the target system?
-Before installation, the Ninja software's configuration file must be set up. This includes choosing the installation location (e.g., program files or system32) and specifying the correct port and host IP.
What type of IP address is used in the example given for the hacking process?
-In the example, a local IP address is used, but the process could also work with a public IP address or a domain name.
How does the hacker verify that the Ninja software has been successfully installed on the target system?
-The hacker checks the service and file directory to confirm that the Ninja software is running, and the connection to Jonin is established.
What actions can the hacker perform once connected to the target system via Jonin and Ninja?
-Once connected, the hacker can perform actions like executing command-line commands, uploading files, and interacting with the system as if they were physically using the computer.
Outlines

Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantMindmap

Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantKeywords

Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantHighlights

Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantTranscripts

Cette section est réservée aux utilisateurs payants. Améliorez votre compte pour accéder à cette section.
Améliorer maintenantVoir Plus de Vidéos Connexes
5.0 / 5 (0 votes)