Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. I want to create a virus...

I want to create a virus...

Scheduled Pinned Locked Moved The Lounge
comsecuritytoolshelp
20 Posts 12 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • J Jasmine2501

    ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

    "Quality Software since 1983!"
    http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

    G Offline
    G Offline
    guiqul163
    wrote on last edited by
    #10

    that's a good idea.

    ========================================= Make friends with you all. My MSN:cime63@hotmail.com My Email:cime63@gmail.com

    D 1 Reply Last reply
    0
    • G guiqul163

      that's a good idea.

      ========================================= Make friends with you all. My MSN:cime63@hotmail.com My Email:cime63@gmail.com

      D Offline
      D Offline
      Don Fletcher
      wrote on last edited by
      #11

      I had this idea back in the late 80's/early 90's and even wrote a test version...but then I realized that as soon as it was in the wild somebody would hack it and turn my good-intentioned "white-hat" vaccine into a "black-hat" virus... ...So while the intent is good, such a tool would undoubtably fall into the wrong hands and be compromised.

      J 1 Reply Last reply
      0
      • D Don Fletcher

        I had this idea back in the late 80's/early 90's and even wrote a test version...but then I realized that as soon as it was in the wild somebody would hack it and turn my good-intentioned "white-hat" vaccine into a "black-hat" virus... ...So while the intent is good, such a tool would undoubtably fall into the wrong hands and be compromised.

        J Offline
        J Offline
        Jasmine2501
        wrote on last edited by
        #12

        But they already have such things, so it wouldn't really hand them anything extra. According to articles I've read, there are bot-net hacks which get into a system and try to eliminate any rival bots, then they tighten up security so that nobody else can come in and kill them. I'm basically proposing the same thing, only when my thing gets in and does its killing and security upgrades, it would self-destruct, leaving a clean system, incapable of sending spam and incapable of being compromised again. The user of the system is likely unaware that their computer has been hijacked in the first place, so it's not likely they will notice that suddenly their computer is not sending spam anymore.

        "Quality Software since 1983!"
        http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

        D 1 Reply Last reply
        0
        • J Jasmine2501

          ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

          "Quality Software since 1983!"
          http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

          P Offline
          P Offline
          Pierre Leclercq
          wrote on last edited by
          #13

          Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York. So they bio engineer a new species of bugs designed to kill the cockroaches. And they add a time bomb in their genes, so that they get extinct once their job done...

          T 1 Reply Last reply
          0
          • J Jasmine2501

            ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

            "Quality Software since 1983!"
            http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

            A Offline
            A Offline
            Ashley van Gerven
            wrote on last edited by
            #14

            I once had the idea to start a chain letter on how to identify and ignore chain letters. But I didn't really put much more thought into it. :)

            "For fifty bucks I'd put my face in their soup and blow." - George Costanza

            CP article: SmartPager - a Flickr-style pager control with go-to-page popup layer.

            1 Reply Last reply
            0
            • J Jasmine2501

              ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

              "Quality Software since 1983!"
              http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

              C Offline
              C Offline
              Colin Angus Mackay
              wrote on last edited by
              #15

              Jasmine2501 wrote:

              I know you're thinking "that can't possibly work"...

              Actually, I'm thinking more along the lines of that it is still illegal under the 1990 Misuse of Computers Act.


              Upcoming Scottish Developers events: * Glasgow: Tell us what you want to see in 2007 My: Website | Blog | Photos

              1 Reply Last reply
              0
              • J Jasmine2501

                If a white-hat virus like this already exists then tell me where to find it. I'm as pissed at the spammers as anyone else. This is our network... I want these criminals off it.

                "Quality Software since 1983!"
                http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                C Offline
                C Offline
                Colin Angus Mackay
                wrote on last edited by
                #16

                Jasmine2501 wrote:

                This is our network... I want these criminals off it.

                The problem with creating a virus is that you can never tell where it is going to stop. It most certainly won't stop at the boundary of your network. And if you want something wholey contained within your network there are several solutions by the major anti-virus companies that will do the job safely and LEGALLY.


                Upcoming Scottish Developers events: * Glasgow: Tell us what you want to see in 2007 My: Website | Blog | Photos

                1 Reply Last reply
                0
                • P Pierre Leclercq

                  Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York. So they bio engineer a new species of bugs designed to kill the cockroaches. And they add a time bomb in their genes, so that they get extinct once their job done...

                  T Offline
                  T Offline
                  tgrt
                  wrote on last edited by
                  #17

                  Pierre Leclercq wrote:

                  Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York.

                  I thought they were trying to remove rats.

                  E 1 Reply Last reply
                  0
                  • J Jasmine2501

                    But they already have such things, so it wouldn't really hand them anything extra. According to articles I've read, there are bot-net hacks which get into a system and try to eliminate any rival bots, then they tighten up security so that nobody else can come in and kill them. I'm basically proposing the same thing, only when my thing gets in and does its killing and security upgrades, it would self-destruct, leaving a clean system, incapable of sending spam and incapable of being compromised again. The user of the system is likely unaware that their computer has been hijacked in the first place, so it's not likely they will notice that suddenly their computer is not sending spam anymore.

                    "Quality Software since 1983!"
                    http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                    D Offline
                    D Offline
                    Dave Kreskowiak
                    wrote on last edited by
                    #18

                    This has been done before, several times. Some of them did the job they set out to do, but they also screwed up the machines they made it on to in other ways. Besides, the malware your going after evolves continuously and will make your virus obsolete after about one day. The bottom line is you're not the first one to think of this, and you won't be last. The idea looks great on paper, but in the end is just as bad as the crap you want to destroy anyway.

                    Dave Kreskowiak Microsoft MVP - Visual Basic

                    1 Reply Last reply
                    0
                    • T tgrt

                      Pierre Leclercq wrote:

                      Have you seen that movie? If not here is the plot. People want to remove cockroaches from New York.

                      I thought they were trying to remove rats.

                      E Offline
                      E Offline
                      El Corazon
                      wrote on last edited by
                      #19

                      tgrt wrote:

                      I thought they were trying to remove rats.

                      nope, roaches.

                      _________________________ Asu no koto o ieba, tenjo de nezumi ga warau. Talk about things of tomorrow and the mice in the ceiling laugh. (Japanese Proverb)

                      1 Reply Last reply
                      0
                      • J Jasmine2501

                        ...that kills spambots (bot-nets), locks down the security of the system, finds a few other hosts, then exterminates itself. I figure, if people are dumb enough to allow the spambots onto their machine, then a bot-killing virus should have no trouble getting in. Trouble is, I need source code for the spambots and I'm not sure of a safe place to find it. Please help me find this code... I am aware of the technical hurdles, and I know you're thinking "that can't possibly work"... tell my why you think so. Or help me find the source code... I know that there are spambots out there that attempt to seek and destroy other spambots, so I assume most of the code has been written already.

                        "Quality Software since 1983!"
                        http://www.smoothjazzy.com/ - see the "Programming" section for freeware tools and articles.

                        E Offline
                        E Offline
                        El Corazon
                        wrote on last edited by
                        #20

                        Jasmine2501 wrote:

                        tell my why you think so

                        self replicating code, regardless of intent, has to deal with many issues related to system compatibility. Especially talking about network bloat. But since I doubt you would believe me, I'll tell you a couple of stories.... Once upon a time there was a group of individuals who got the great idea that they would make a virus that was the anti-virus for their own intranet within a large corporation. No more updates to users, no more users deactivating, no more forgetting to install on new machines, etc. A utopian idea! Permanent virus immunization of a network rather than a computer. The firewalls would keep the virus in, and they could optimize the software to work only on specific machines (Pentium class) because all their machines were of this generation. Until a user brought their own laptop in, against company regs, the machine was "infected" and "protected" and then took it home and "infected" and "crashed" his 486 home computer.... then another, then another. Luckily, it never got to anyone who had a Pentium class at home because the virus had gotten out and became a "crash virus" (one of many classes of viruses that were meant to do "something" but incompatibilities in their code prevent that from happening), the virus was irradicated, the plan scrapped. Now let me tell you another story.... Once upon a time, A bright young man, full of ego and determination, which is common of young men, built what he thought was a pretty darn good utility for an online game. It created cool maps, plan centers and automated tasks (let your computer do the typing if the game is timed). It helped plan, using AI improved from a chess game and several other games he wrote in the years prior, improved it a bit too. Gave the users of the software a definitive advantage over users without the software, so he decided to sell it, shareware since he was young and without much business experience. He secured it with nagware, and timed capability of the AI (get them used to it, take it away, and they will pay). The security system was unique to the world of shareware, self modifying keys, self-modifying algorithms, and self-encryption of the code itself. What we now call polymorphic code. It was great, two weeks after release, the AI shut off on those who installed it immeadiately and the money started pouring in. Well, at least as much as it could for a shareware product, and $15 a registration. He made approximately $600 in

                        1 Reply Last reply
                        0
                        Reply
                        • Reply as topic
                        Log in to reply
                        • Oldest to Newest
                        • Newest to Oldest
                        • Most Votes


                        • Login

                        • Don't have an account? Register

                        • Login or register to search.
                        • First post
                          Last post
                        0
                        • Categories
                        • Recent
                        • Tags
                        • Popular
                        • World
                        • Users
                        • Groups