Plans & Pricing
Should we send host modifier file to the victim to perform the attack?
You can send it via post
No, the host file already exists on the victim's PC. We just want to modify it. HostModifier.exe does that automatically when executed. So we need to send only the HostModifier to the victim, you can be stealthy by making it look like an image, all of this is clearly covered in the video.