Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I want to create a virus...

I want to create a virus...

Scheduled Pinned Locked Moved The Lounge
comsecuritytoolshelp
20 Posts 12 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J Jasmine2501

    ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

    "Quality Software since 1983!"
    http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

    B Offline
    B Offline
    Bradml
    wrote on last edited by
    #2

    They do already exist and like hell anyone here would give source code for a virus to someone with unconfirmable intenstions.


    Brad Australian -CAUTION- The previous statement may contain traces of PHP, and by reading this statement you negate the right to vote me down.

    J 1 Reply Last reply
    0
    • B Bradml

      They do already exist and like hell anyone here would give source code for a virus to someone with unconfirmable intenstions.


      Brad Australian -CAUTION- The previous statement may contain traces of PHP, and by reading this statement you negate the right to vote me down.

      J Offline
      J Offline
      Jasmine2501
      wrote on last edited by
      #3

      If a white-hat virus like this already exists then tell me where to find it. I'm as pissed at the spammers as anyone else. This is our network... I want these criminals off it.

      "Quality Software since 1983!"
      http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

      B L C 3 Replies Last reply
      0
      • J Jasmine2501

        If a white-hat virus like this already exists then tell me where to find it. I'm as pissed at the spammers as anyone else. This is our network... I want these criminals off it.

        "Quality Software since 1983!"
        http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

        B Offline
        B Offline
        Bradml
        wrote on last edited by
        #4

        As said before, I don't know who you are and cannot confirm your identity. It is still illegal to install unwanted components on anyones computer so regardless of your intenstions you will be breaking the law. Finally the FBI and other organisations have been trying to stop internet crime for many years, do you really think you will be the one to stop it?


        Brad Australian -CAUTION- The previous statement may contain traces of PHP, and by reading this statement you negate the right to vote me down.

        J 1 Reply Last reply
        0
        • J Jasmine2501

          If a white-hat virus like this already exists then tell me where to find it. I'm as pissed at the spammers as anyone else. This is our network... I want these criminals off it.

          "Quality Software since 1983!"
          http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

          L Offline
          L Offline
          Lost User
          wrote on last edited by
          #5

          Can't you use Google? I found a collection of viruses along with their source code which I experimented with in a virtual machine. It feels good to destroy a virtual machine by infecting it with a ton of viruses.;P You must be aware the most viruses are written in assembler. There are some really good tutorials out there, they are intended to be for anti-malware creators and virus writers alike. Its definitely good knowledge. Even though virus writers are considered scum they are important because if there were none our software systems would never be secured. They are a necessity that gradually forces higher quality software on us.

          █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

          R J 2 Replies Last reply
          0
          • L Lost User

            Can't you use Google? I found a collection of viruses along with their source code which I experimented with in a virtual machine. It feels good to destroy a virtual machine by infecting it with a ton of viruses.;P You must be aware the most viruses are written in assembler. There are some really good tutorials out there, they are intended to be for anti-malware creators and virus writers alike. Its definitely good knowledge. Even though virus writers are considered scum they are important because if there were none our software systems would never be secured. They are a necessity that gradually forces higher quality software on us.

            █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

            R Offline
            R Offline
            Rob Graham
            wrote on last edited by
            #6

            Captain See Sharp wrote:

            if there were none our software systems would never be secured.

            Nor would they need to be...

            Captain See Sharp wrote:

            They are a necessity that gradually forces higher quality software on us.

            Absolute bunk. Equivalent to calling terrorists patriots.

            L 1 Reply Last reply
            0
            • B Bradml

              As said before, I don't know who you are and cannot confirm your identity. It is still illegal to install unwanted components on anyones computer so regardless of your intenstions you will be breaking the law. Finally the FBI and other organisations have been trying to stop internet crime for many years, do you really think you will be the one to stop it?


              Brad Australian -CAUTION- The previous statement may contain traces of PHP, and by reading this statement you negate the right to vote me down.

              J Offline
              J Offline
              Jasmine2501
              wrote on last edited by
              #7

              Well, my basic premise is, we are smarter and more numerous than the people who initiated this attack on the internet and so we should be able to bring them down. The FBI is not interested in killing the spammers because they are part of the government that legalized what they are doing. Read this: http://www.arachnoid.com/lutusp/antispam.html[^] (toward the end is some stuff about CAN-SPAM, but the whole article is good) As for intentions, coders help other coders all the time without being clear on their intentions. I've helped people figure out how to send emails from their server, and that information could be used to spam the hell out of people, but I'm being clear about my intentions here. There's no way to tell I'm not lying (even if you knew me for years and we were speaking in person), but if I was up to no good, I probably wouldn't be asking for an open discussion about the issue, on a forum like this one.

              "Quality Software since 1983!"
              http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

              1 Reply Last reply
              0
              • L Lost User

                Can't you use Google? I found a collection of viruses along with their source code which I experimented with in a virtual machine. It feels good to destroy a virtual machine by infecting it with a ton of viruses.;P You must be aware the most viruses are written in assembler. There are some really good tutorials out there, they are intended to be for anti-malware creators and virus writers alike. Its definitely good knowledge. Even though virus writers are considered scum they are important because if there were none our software systems would never be secured. They are a necessity that gradually forces higher quality software on us.

                █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                J Offline
                J Offline
                Jasmine2501
                wrote on last edited by
                #8

                When I Google for it, I get a bunch of shlock. I only find people selling suspect virus removers and lots of blogs about the issue, but nothing useful. Perhaps you can help me with my search terms? I'm a little too experienced to be asking this kind of thing without Googleing first...

                "Quality Software since 1983!"
                http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                1 Reply Last reply
                0
                • R Rob Graham

                  Captain See Sharp wrote:

                  if there were none our software systems would never be secured.

                  Nor would they need to be...

                  Captain See Sharp wrote:

                  They are a necessity that gradually forces higher quality software on us.

                  Absolute bunk. Equivalent to calling terrorists patriots.

                  L Offline
                  L Offline
                  Lost User
                  wrote on last edited by
                  #9

                  Rob Graham wrote:

                  Nor would they need to be...

                  You set your self up for attack with that kind of attitude. There may not be hackers, spammers, and virus writers for a certain time until it is discovered to be doable and profitable. Even if laws were so strict that virus writers became unheard of there may be a time when one will create a powerful virus and *uck up millions of important systems and you will wish developers like you never had that absurd attitude.

                  Rob Graham wrote:

                  Absolute bunk. Equivalent to calling terrorists patriots.

                  Possibly, but the terrorists have exposed serious vulnerabilities in my country and that kind of terrorist attack will be extremely difficult and will be avoided for now on. I am in no way praising the scum in any way by the way.

                  █▒▒▒▒▒██▒█▒██ █▒█████▒▒▒▒▒█ █▒██████▒█▒██ █▒█████▒▒▒▒▒█ █▒▒▒▒▒██▒█▒██

                  1 Reply Last reply
                  0
                  • J Jasmine2501

                    ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

                    "Quality Software since 1983!"
                    http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                    G Offline
                    G Offline
                    guiqul163
                    wrote on last edited by
                    #10

                    that's a good idea.

                    ========================================= Make friends with you all. My MSN:cime63@hotmail.com My Email:cime63@gmail.com

                    D 1 Reply Last reply
                    0
                    • G guiqul163

                      that's a good idea.

                      ========================================= Make friends with you all. My MSN:cime63@hotmail.com My Email:cime63@gmail.com

                      D Offline
                      D Offline
                      Don Fletcher
                      wrote on last edited by
                      #11

                      I had this idea back in the late 80's/early 90's and even wrote a test version...but then I realized that as soon as it was in the wild somebody would hack it and turn my good-intentioned "white-hat" vaccine into a "black-hat" virus... ...So while the intent is good, such a tool would undoubtably fall into the wrong hands and be compromised.

                      J 1 Reply Last reply
                      0
                      • D Don Fletcher

                        I had this idea back in the late 80's/early 90's and even wrote a test version...but then I realized that as soon as it was in the wild somebody would hack it and turn my good-intentioned "white-hat" vaccine into a "black-hat" virus... ...So while the intent is good, such a tool would undoubtably fall into the wrong hands and be compromised.

                        J Offline
                        J Offline
                        Jasmine2501
                        wrote on last edited by
                        #12

                        But they already have such things, so it wouldn't really hand them anything extra. According to articles I've read, there are bot-net hacks which get into a system and try to eliminate any rival bots, then they tighten up security so that nobody else can come in and kill them. I'm basically proposing the same thing, only when my thing gets in and does its killing and security upgrades, it would self-destruct, leaving a clean system, incapable of sending spam and incapable of being compromised again. The user of the system is likely unaware that their computer has been hijacked in the first place, so it's not likely they will notice that suddenly their computer is not sending spam anymore.

                        "Quality Software since 1983!"
                        http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                        D 1 Reply Last reply
                        0
                        • J Jasmine2501

                          ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

                          "Quality Software since 1983!"
                          http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                          P Offline
                          P Offline
                          Pierre Leclercq
                          wrote on last edited by
                          #13

                          Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York. So they bio engineer a new species of bugs designed to kill the cockroaches. And they add a time bomb in their genes, so that they get extinct once their job done...

                          T 1 Reply Last reply
                          0
                          • J Jasmine2501

                            ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

                            "Quality Software since 1983!"
                            http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                            A Offline
                            A Offline
                            Ashley van Gerven
                            wrote on last edited by
                            #14

                            I once had the idea to start a chain letter on how to identify and ignore chain letters. But I didn't really put much more thought into it. :)

                            "For fifty bucks I'd put my face in their soup and blow." - George Costanza

                            CP article: SmartPager - a Flickr-style pager control with go-to-page popup layer.

                            1 Reply Last reply
                            0
                            • J Jasmine2501

                              ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

                              "Quality Software since 1983!"
                              http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                              C Offline
                              C Offline
                              Colin Angus Mackay
                              wrote on last edited by
                              #15

                              Jasmine2501 wrote:

                              I know you're thinking "that can't possibly work"...

                              Actually, I'm thinking more along the lines of that it is still illegal under the 1990 Misuse of Computers Act.


                              Upcoming Scottish Developers events: * Glasgow: Tell us what you want to see in 2007 My: Website | Blog | Photos

                              1 Reply Last reply
                              0
                              • J Jasmine2501

                                If a white-hat virus like this already exists then tell me where to find it. I'm as pissed at the spammers as anyone else. This is our network... I want these criminals off it.

                                "Quality Software since 1983!"
                                http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                                C Offline
                                C Offline
                                Colin Angus Mackay
                                wrote on last edited by
                                #16

                                Jasmine2501 wrote:

                                This is our network... I want these criminals off it.

                                The problem with creating a virus is that you can never tell where it is going to stop. It most certainly won't stop at the boundary of your network. And if you want something wholey contained within your network there are several solutions by the major anti-virus companies that will do the job safely and LEGALLY.


                                Upcoming Scottish Developers events: * Glasgow: Tell us what you want to see in 2007 My: Website | Blog | Photos

                                1 Reply Last reply
                                0
                                • P Pierre Leclercq

                                  Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York. So they bio engineer a new species of bugs designed to kill the cockroaches. And they add a time bomb in their genes, so that they get extinct once their job done...

                                  T Offline
                                  T Offline
                                  tgrt
                                  wrote on last edited by
                                  #17

                                  Pierre Leclercq wrote:

                                  Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York.

                                  I thought they were trying to remove rats.

                                  E 1 Reply Last reply
                                  0
                                  • J Jasmine2501

                                    But they already have such things, so it wouldn't really hand them anything extra. According to articles I've read, there are bot-net hacks which get into a system and try to eliminate any rival bots, then they tighten up security so that nobody else can come in and kill them. I'm basically proposing the same thing, only when my thing gets in and does its killing and security upgrades, it would self-destruct, leaving a clean system, incapable of sending spam and incapable of being compromised again. The user of the system is likely unaware that their computer has been hijacked in the first place, so it's not likely they will notice that suddenly their computer is not sending spam anymore.

                                    "Quality Software since 1983!"
                                    http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                                    D Offline
                                    D Offline
                                    Dave Kreskowiak
                                    wrote on last edited by
                                    #18

                                    This has been done before, several times. Some of them did the job they set out to do, but they also screwed up the machines they made it on to in other ways. Besides, the malware your going after evolves continuously and will make your virus obsolete after about one day. The bottom line is you're not the first one to think of this, and you won't be last. The idea looks great on paper, but in the end is just as bad as the crap you want to destroy anyway.

                                    Dave Kreskowiak Microsoft MVP - Visual Basic

                                    1 Reply Last reply
                                    0
                                    • T tgrt

                                      Pierre Leclercq wrote:

                                      Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York.

                                      I thought they were trying to remove rats.

                                      E Offline
                                      E Offline
                                      El Corazon
                                      wrote on last edited by
                                      #19

                                      tgrt wrote:

                                      I thought they were trying to remove rats.

                                      nope, roaches.

                                      _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                                      1 Reply Last reply
                                      0
                                      • J Jasmine2501

                                        ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

                                        "Quality Software since 1983!"
                                        http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                                        E Offline
                                        E Offline
                                        El Corazon
                                        wrote on last edited by
                                        #20

                                        Jasmine2501 wrote:

                                        tell my why you think so

                                        self replicating code, regardless of intent, has to deal with many issues related to system compatibility. Especially talking about network bloat. But since I doubt you would believe me, I'll tell you a couple of stories.... Once upon a time there was a group of individuals who got the great idea that they would make a virus that was the anti-virus for their own intranet within a large corporation. No more updates to users, no more users deactivating, no more forgetting to install on new machines, etc. A utopian idea! Permanent virus immunization of a network rather than a computer. The firewalls would keep the virus in, and they could optimize the software to work only on specific machines (Pentium class) because all their machines were of this generation. Until a user brought their own laptop in, against company regs, the machine was "infected" and "protected" and then took it home and "infected" and "crashed" his 486 home computer.... then another, then another. Luckily, it never got to anyone who had a Pentium class at home because the virus had gotten out and became a "crash virus" (one of many classes of viruses that were meant to do "something" but incompatibilities in their code prevent that from happening), the virus was irradicated, the plan scrapped. Now let me tell you another story.... Once upon a time, A bright young man, full of ego and determination, which is common of young men, built what he thought was a pretty darn good utility for an online game. It created cool maps, plan centers and automated tasks (let your computer do the typing if the game is timed). It helped plan, using AI improved from a chess game and several other games he wrote in the years prior, improved it a bit too. Gave the users of the software a definitive advantage over users without the software, so he decided to sell it, shareware since he was young and without much business experience. He secured it with nagware, and timed capability of the AI (get them used to it, take it away, and they will pay). The security system was unique to the world of shareware, self modifying keys, self-modifying algorithms, and self-encryption of the code itself. What we now call polymorphic code. It was great, two weeks after release, the AI shut off on those who installed it immeadiately and the money started pouring in. Well, at least as much as it could for a shareware product, and $15 a registration. He made approximately $600 in

                                        1 Reply Last reply
                                        0
                                        Reply
                                        • Reply as topic
                                        Log in to reply
                                        • Oldest to Newest
                                        • Newest to Oldest
                                        • Most Votes


                                        • Login

                                        • Don't have an account? Register

                                        • Login or register to search.
                                        • First post
                                          Last post
                                        0
                                        • Categories
                                        • Recent
                                        • Tags
                                        • Popular
                                        • World
                                        • Users
                                        • Groups