Characteristics of the virus:
The biggest feature of the virus is self-replicating, from the classification of viruses there are many kinds, here we will introduce the most popular add-onVirus, which is adapted to the normal file to achieve its own replication purposes.From a procedural point of view, we have two things to do:
1, so that the program can be copied to other programs without affecting the wo
[%repeat_0 match= "/data/option"%][%= @title%] [%= @count%] ticket [[%= @percent%]%]
[%_repeat_0%]
SXS. EXE this is a theft of QQ account password Trojan virus, the characteristics can be transmitted through removable disk. The virus's main harm is to steal QQ account and password, the virus will also end a large number of anti-virus software, reduce the securi
, the amount of money for "Blackmail" is generally not large, so there are not a few people who spend money to buy passwords. Since this virus does not require the authors to have a very high level of technology, it also contributes to the prevalence of "Hacking. Here is an example of the simplest "click on the bar" Code. It is a batch processing (. bat) file:[Plain] view plaincopy@ Echo off net user Jiang Jun wojiushimimaNet user to add the password
programHere I am using code::blocks13.12 this open source and free development environment, because this software can automatically calculate the execution time of the program, it is easy for us to compare after the operation. For testing purposes, I have placed 10 programs at the root of the E drive, 4 of which are samples of viruses we have previously told, and 6 programs that we have used before:Figure 1A small square in front of it is a
In the middle of January this year, the network Supervision Department of Xiantao Public Security Bureau of Hubei Province conducted a survey on the producers of "panda incense" virus according to the unified deployment of the Security Supervision Bureau and provincial Police Department. After investigation, the producer of panda incense virus in Hubei province, Wuhan Li June, according to Li June, on Octob
MSN virus refers to those who send a poisonous file or a poisonous Web page link through MSN, the malicious program that realizes self propagation. Most of the MSN virus workflows are fairly similar and are grouped into the following 3 steps:
1, the virus obtains the user's MSN Friend list, sends the virus file or the
virus Program Source code example Anatomy-CIH virus [5]
Push ECXLoop $ ; destroys the ROM data of additional 000e0000-000e007f segments in the BIOS, a total of 80h bytesXOR Ah, ahmov [EAX], AL Xchg ecx, eaxLoop $ ; Displays and activates the BIOS 000E0000-000FFFFF segment data, a total of KB, the segment can be written to information mov eax, 0f5555hPop ecxmov ch, 0aahCall EBXmov byte ptr [eax], 2
message through the SendMessageA, and analog users, send click the mouse button message off. However, after testing the above methods can not close Jinshan poison Pa.
4. Compares the current file run path to a random name under the system SYSTEM32, not copying its own copy to the system SYSTEM32.
5. Inject the DLL into the system process, then release Det.bat and delete itself after running
6. Virus files inject explorer.exe or Winlogon.exe loops
: After the virus runs, it will automatically connect to 10 sites, such as H**p://a.2007ip.***/cald/01.exe, for virus downloading. And it will terminate the KAVPFW.EXE and Ravmond.exe, and many other popular anti-virus software and firewall monitoring process.
Second, "Song of Sadness" Variant A (WIN32.TONE.A) threat
password is also "Wojiushimima". Line Fourth of the code means that the computer is shut down after 10 seconds. Run the above code:Figure 1 Running the "RIP" virusAfter the program runs for 10 seconds, the auto power off, and then power on, as shown in:Figure 2Visible, there are two accounts, one is the original account, but the password has been modified. Another account is the contact information of the
descriptor in GDT (Global Descriptor Table) and LDT (Local Descriptor Table) and enter the core state. Of course, it is not necessary to use the door description. There are still many ways to get Ring0. As far as I know, there are no more than 10 methods, such as calling Gate, Intgate, Trapgate, and Fault ), interrupt request (IRQs), Port (Ports), virtual machine Manager (VMM), Callback (Callback), form conversion (Thunks), device IO control (DeviceI
Just repeatedly tested several versions, DF of the above version is all worn ...
Completely crazy ing .... Currently, only a few sites can be blocked on the route .... Look forward to the emergence of the master!
Sample sent up .... Say you can't penetrate yourself first Test
Overall protection, the system is completely open, without any restrictions! Now do not know why some systems do not wear ~
Immediately after running, look at the startup item.
The
numbers separated by a space, if a website contains a virus, the number of viruses will not exceed 3.The last line of output statistics, the following formatTotal: Number of sites with virusesThere is a space after the colon.Sample Input3aaabbbccc2aaabbbcccbbaaccSample OutputWeb 1:1 2 3total:1 Source2009 multi-university Training Contest 10-host by NITRecommendgaojie | We have carefully selected several si
This series of tutorials is copyright "I spring and Autumn" All, reproduced please indicate the source.For video tutorials, please visit "I Spring" (www.ichunqiu.com).PrefaceAfter several discussions, we have a certain understanding of the U disk virus, then this time we will be based on the characteristics of the virus behavior, to write needles for the U-disk virus
I. Brief introduction to the USB flash drive virus:
The USB flash drive (Auto virus) is very common recently and has a certain degree of harm. Its Mechanism is to rely on Windows's automatic operation function, so that when we click to open the disk, automatically execute related files. At present, we use USB flash drives very frequently. When we enjoy the convenience of USB flash drives, the USB flash driv
addresses in vswitches.
3. After binding an IP address and a MAC address, you need to re-bind the network adapter. Therefore, we recommend that you install anti-virus software on the client to solve this problem: the virus found is in the 4B variable speed gear, virus programs can be downloaded in the http://www.wgwang.com/list/3007.html:
1. KAV (Kaspersky), whi
, Internet and BBS have been widely used, making it possible for domestic and foreign viruses to spread widely and quickly. These international computer information dissemination media are potential sources of virus viruses and tubes (of course, these network systems also have a highly secure anti-virus/Anti-Virus System ), this makes every computer user vulnerab
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.