How to create a viral link for phone and computer?

Table of contents:

How to create a viral link for phone and computer?
How to create a viral link for phone and computer?
Anonim

There are days when you want to piss someone off in secret, or you decide to create a virus that will steal data, any data. Imagine ourselves as evil hackers who decide to take action. Let's explore this immense art.

Virus definition

The history of computer viruses dates back to 1983 when Fred Cohen first used it.

Online link check
Online link check

A virus is a malicious code, it is aimed at taking control of your files, settings. Creates copies of itself, in every possible way clutters up the user's personal computer. Some can be detected immediately when others hide in the system and parasitize it. Often they are transmitted through sites hosting pirated content, porn sites, and others. It happens that downloading viruses occurs when you want to download a mod or cheat. It's pretty easy to spread a virus if you have a viral link ready.

Methods of exposure to malware

joke virus
joke virus

Computer viruses include many malicious programs, but not all of themcapable of "breeding":

  • Worms. They infect files on the computer, these can be any files, from.exe to boot sectors. Transmitted through chats, programs for communication such as Skype, icq, via e-mail.
  • Trojan horses, or Trojans. They are deprived of independent ability to spread: they get on the victim's computer thanks to their authors and third parties.
  • Rootkit. The assembly of various software utilities, when penetrating the victim's computer, receives superuser rights, we are talking about UNIX systems. It is a multifunctional tool for "covering up traces" when invading the system using sniffers, scanners, keyloggers, Trojan applications. Capable of infecting a device running the Microsoft Windows operating system. They capture tables of calls and their functions, methods of using drivers.
  • Extortionists. Such malware prevents the user from logging into the device by forcing a ransom. The latest major ransomware-related events are WannaCry, Petya, Cerber, Cryptoblocker, and Locky. All of them demanded bitcoin for the return of access to the system.
Fake update
Fake update
  • Keylogger. Monitors the input of logins and passwords on the keyboard. Captures all clicks, and then sends the action log to a remote server, after which the attacker uses this data at his discretion.
  • Sniffers. Analyzes data from a network card, writes logs by listening, connecting a sniffer when it breakschannel, branching with a sniffer copy of traffic, as well as through the analysis of spurious electromagnetic radiation, attacks at the channel or network level.
  • Botnet, or zombie networks. Such a network is a set of computers that form one network and are infected with malware in order to gain access to a hacker or other intruder.
  • Exploits. This type of malware can be useful for pirates because exploits are caused by errors in the software development process. So the attacker gains access to the program, and then to the user's system, if the hacker intended so. They have a separate vulnerability classification: day zero, DoS, spoofing or XXS.

Distribution routes

Malicious content can get onto your device in many ways:

Newsletter in social networks
Newsletter in social networks
  • Viral link.
  • Access to a server or local network through which a malicious application will be distributed.
  • Running a program infected with a virus.
  • Working with applications of the Microsoft Office suite, when using document macro viruses, the virus spreads throughout the user's personal computer.
Spam viruses
Spam viruses
  • View attachments that came with e-mail messages, but they turned out to be infected programs and documents.
  • Starting the operating system from an infected system drive.
  • Installing a pre-infected operating system on a computer.

Whereviruses can hide

When a viral link is made, and you run a program that starts hidden work on a personal computer, then some viruses and other malicious programs are able to hide their data in the system or in executable files, the extension of which can be of the following type:

  • .com,.exe - you downloaded some program, and there was a virus;
  • .bat - batch files containing certain algorithms for the operating system;
  • .vbs - program files in Visual Basic for Application;
  • .scr - screensavers program files that steal data from the device screen;
  • .sys - driver files;
  • .dll,.lib,.obj - library files;
  • .doc - Microsoft Word document;
  • .xls - Microsoft Excel document;
  • .mdb - Microsoft Access document;
  • .ppt - Power Point document;
  • .dot - application template for Microsoft Office suites.

Signs

Spread of the virus
Spread of the virus

Any disease or infection proceeds in a latent phase or in an open one, this principle is also inherent in malicious software:

  • The device began to malfunction, programs that worked well before suddenly began to slow down or crash.
  • Device is slow.
  • Problem starting the operating system.
  • Disappearing files and directories or changing their contents.
  • The content of the file is being modified.
  • Change file modification time. It can be seen iffolder use the list view, or you look at the element property.
  • Increase or decrease the number of files on the disk, and subsequently increase or decrease the amount of available memory.
  • RAM becomes smaller due to the work of extraneous services and programs.
Trojan on the site
Trojan on the site
  • Displaying shocking or other images on the screen without user intervention.
  • Strange beeps.

Protection methods

It's time to think about ways to protect against intrusion:

  • Program methods. These include antiviruses, firewalls and other security software.
  • Hardware methods. Protection against tampering to the ports or files of the device, directly when accessing the hardware.
  • Organizational methods of protection. These are additional measures for employees and others who may have access to the system.

How to find a list of viral links? Thanks to the Internet, you can download services, for example, from Dr. Web. Or use a special service to show all possible harmful links. There is a list of viral links. It remains to choose the most suitable option.

Viral link

Do not forget that the use of virus programs is punishable by law!

Let's get down to the most important action - to create viral links and find out how to spread them.

  • Choose the operating system to attack. More often this is Microsoft Windows, since it is more common than the rest.systems, especially when it comes to older versions. In addition, many users do not update their operating systems, leaving them vulnerable to attacks.
  • Choose the distribution method. How to create a viral link that won't spread? No way. To do this, you can pack it into an executable file, a macro in Microsoft Office, a web script.
  • Find out the weak spot to attack. Tip: if a user downloads pirated software, he usually turns off the antivirus or does not pay attention to it due to the presence of a pill in the repack, so this is another way to infiltrate.
  • Determine the functionality of your virus. You can simply test your antivirus to see if it can detect your virus, or you can use the malware for larger purposes such as deleting files, viewing messages, and more.
  • In order to write something, you have to choose a language. You can use any language, or even several, but C and C ++ are used to a greater extent, there is Microsoft Office for macro viruses. You can figure it out with online tutorials. Visual Basic is a development environment.
  • Time to create. This can take a long time. Do not forget about ways to hide the virus from antivirus programs, otherwise your program will be quickly found and neutralized. It’s not a fact that you will hurt someone badly, so sleep well. However, remember that any malicious software must be held accountable! Learn more about polymorphic code.
  • See code hiding methods.
  • Check the virus for he alth in a virtual machine.
  • Upload it to the network and wait for the first "clients".

A viral link for a phone is created in much the same way, but with iOS devices you will have to suffer, because there is a good protection system, unlike Android. However, in the latest versions it was possible to fix many holes in the security system. Do not forget that there are still old devices, and knowing the "love" of creating new versions from third-party developers, most of the android devices are at risk.

Recommended: