So, Friends hope you liked the post on how to create notepad virus using batch scripting, i made this tutorial much more descriptive, try to create these virus yourself, in case you encounter any problem and need help feel free to comment, i am always here for your help and don’t forget to share this post with you friends if you found it helpful and enjoyable, also for supporting me to come. This Section contains the Virus Codes. Some of these codes are already familiar with you, But still very much harmful and educational too. Below mentioned some of the Platforms in which these virus are coded. BATCH Programming. C/C Python Visual Basic. The code here are used for Educational Purposes. Please don't use them to harm. In this post, we want to discuss how to make a simple computer virus using python for fun project. Hope you are doing well. A computer virus is a type of malicious software program (“malware”) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.Infecting computer programs can.
- How To Make Simple Virus
- How To Create A Trojan Virus Using Notepad Free
- Create Simple Virus On Notepad
- Virus With Notepad
- Virus Scripts For Notepad
- Notepad Virus Codes
You can make a trigger like this: If the file StopVirusRunning.txt is not present, then run the virus. Keep the virus in the same directory as the file. When you release the virus, don't include the file.
Some of the skills that hackers have are programming and computer networking skills. They often use these skills to gain access to systems. The objective of targeting an organization would be to steal sensitive data, disrupt business operations or physically damage computer controlled equipment. Trojans, viruses, and worms can be used to achieve the above-stated objectives.
In this article, we will introduce you to some of the ways that hackers can use Trojans, viruses, and worms to compromise a computer system. We will also look at the countermeasures that can be used to protect against such activities.
Topics covered in this tutorial
What is a Trojan horse?
A Trojan horse is a program that allows the attack to control the user’s computer from a remote location. The program is usually disguised as something that is useful to the user. Once the user has installed the program, it has the ability to install malicious payloads, create backdoors, install other unwanted applications that can be used to compromise the user’s computer, etc.
The list below shows some of the activities that the attacker can perform using a Trojan horse. Microsoft excel 2008 tutorial for mac.
- Use the user’s computer as part of the Botnet when performing distributed denial of service attacks.
- Damage the user’s computer (crashing, blue screen of death, etc.)
- Stealing sensitive data such as stored passwords, credit card information, etc.
- Modifying files on the user’s computer
- Electronic money theft by performing unauthorized money transfer transactions
- Log all the keys that a user presses on the keyboard and sending the data to the attacker. This method is used to harvest user ids, passwords, and other sensitive data.
- Viewing the users’ screenshot
- Downloading browsing history data
What is a worm?
A worm is a malicious computer program that replicates itself usually over a computer network. An attacker may use a worm to accomplish the following tasks;
- Install backdoors on the victim’s computers. The created backdoor may be used to create zombie computers that are used to send spam emails, perform distributed denial of service attacks, etc. the backdoors can also be exploited by other malware.
- Worms may also slowdown the network by consuming the bandwidth as they replicate.
- Install harmful payload code carried within the worm.
What is a Virus?
- A virus is a computer program that attaches itself to legitimate programs and fileswithout the user’s consent. Viruses can consume computer resources such as memory and CPU time. The attacked programs and files are said to be “infected”. A computer virus may be used to;
- Access private data such as user id and passwords
- Display annoying messages to the user
- Corrupt data in your computer
- Log the user’s keystrokes
How To Make Simple Virus
Computer viruses have been known to employ social engineering techniques. These techniques involve deceiving the users to open the files which appear to be normal files such as Word or Excel documents. Once the file is opened, the virus code is executed and does what it’s intended to do.
Trojans, Viruses, and Worms counter measures
- To protect against such attacks, an organization can use the following methods.
- A policy that prohibits users from downloading unnecessary files from the Internet such as spam email attachments, games, programs that claim to speed up downloads, etc.
- Anti-virus software must be installed on all user computers. The anti-virus software should be updated frequently, and scans must be performed at specified time intervals.
- Scan external storage devices on an isolated machine especially those that originate from outside the organization.
- Regular backups of critical data must be made and stored on preferably read-only media such as CDs and DVDs.
- Worms exploit vulnerabilities in the operating systems. Downloading operating system updates can help reduce the infection and replication of worms.
- Worms can also be avoided by scanning, all email attachments before downloading them.
Trojan, Virus, and Worm Differential Table
Trojan | Virus | Worm | |
---|---|---|---|
Definition | Malicious program used to control a victim’s computer from a remote location. | Self replicating program that attaches itself to other programs and files | Illegitimate programs that replicate themselves usually over the network |
Purpose | Steal sensitive data, spy on the victim’s computer, etc. | Disrupt normal computer usage, corrupt user data, etc. | Install backdoors on victim’s computer, slow down the user’s network, etc. |
Counter Measures | Use of anti-virus software, update patches for operating systems, security policy on usage of the internet and external storage media, etc. |
Note: If you do not have Kali Linux, you can buy a pre-made ready to boot USB with Kali Linux on it from our shop.
In this article, we will be using one of Kali Linux’s vast selection of hacking tools to create a trojan (also known as a RAT (Remote Access Tool) in hacking circles). Depending on the tools we use, we can have access to our victim’s files and system processes, including the ability to record keystrokes or take a screenshot through their webcam.
A quick preview of what’s to come
Step 1: Update and Upgrade Kali Linux
You should be periodically updating Kali Linux. If you haven’t upgraded in a while or you just booted it up, now is a good time to update.
Open the terminal by clicking the window at the top and type in:
Next, type in:
This should update your system to the most recent version, ensuring that all the tools will work exactly as they should. Now we can begin.
Step 2: Open exploit software
In this article, we will be using the metasploit framework. Metasploit is a software that comes pre-installed on all Kali Linux machines that allows you to create custom payloads that will link back to your computer from the victim’s computer. In this case, the payload is our RAT. Using metasploit, a hacker can create a payload, save it to a file, and trick some unsuspecting user into clicking on it through social engineering. If you don’t know what we mean by social engineering, think of the famous Nigerian Prince scam. The only difference in this case is that instead of tricking the user into giving him bank account information, the hacker tricks the user into clicking on a malicious file.
Open up the terminal and type in
This will show a list of commands available to you in metasploit. To see available payloads, type in
This will list all available payloads for you to use. As you can see, there are a lot of them. If you want to see other options, you can type in any of the other options listed on screen. You can see options like formatting, platforms, encoders (which will be discussed later in this article), encryption keys, bad characters, and many others.
Step 2.5: Fix any errors
When giving the command to list payloads, you might see this error: Fl studio 12 audioz.
If you see this, it means that bundler is either set up incorrectly or hasn’t been updated.
Note: if you did not see this error, you can skip to step 3.
To fix this, change the current directory (file) to usr/share/metasploit-framework by typing in:
from the root directory. If you make a mistake, you can type in
to go back to the previous directory or type in any directory after cd to go there.
Now that we are in the metasploit-framework directory, type in
to install bundler, then type in
If bundler is not the correct version, you should get a message telling you which version to install (in this case it was 1.17.3). Type in
and then type in
After all of that, everything should work perfectly.
Type in
to go back to the root directory.
Step 3: Choose our payload
Type in
to see a list of payloads.
We recommend using windows/meterpreter/reverse_tcp. It allows you to keylog, sniff for data, and control the infected computer’s file system, microphone, and webcam. It is one of the most versatile, invasive, and devastating payloads in metasploit.
Step 4: Customize our payload
How To Create A Trojan Virus Using Notepad Free
Now that we have our payload, we can check what options we have. Type:
to see what we can change about the exploit and where the exploit sends the information.
We see that LHOST is blank; this is where the exploit sends information from the infected device. In most cases, this will be your ip address.
To find your ip address, type
into the terminal to get this window. Your ip address is after the word “inet.” If you are connected to the internet via ethernet, use the ip address at eth0; if you are connected wirelessly, use the one at wlan0.
Create Simple Virus On Notepad
Our ip address is our LHOST parameter.
Step 5: Generate the trojan
Now that we have our payload, ip address, and port number, we have all the information that we need. Type in:
The file type should be exe, and the path should be the file name (make sure the file extension after the name and the file type match). Especially make sure to not press enter before putting the “> [path],” as this will run the exploit on your own device.
If we look in our files using ls, we see that our new file pops up.
Step 6: Encrypt the trojan
Since windows/meterpreter/reverse_tcp is a common exploit, many antivirus programs will detect it. However, we can encrypt the program so that an antivirus can’t catch it. Included with metasploit is a long list of encryptors. Type:
Once you choose the encryption you want (we recommend x86/shikata_ga_nai), you can encrypt it multiple times when you type in the command to make the exploit. Encrypting the file multiple times helps prevent antivirus programs from catching your virus. Type in:
Now we have made a trojan virus that has been encrypted and harder to recognize by an antivirus program. If we type ‘ls’ to look at our files, we see…
Our new trojan is in our files.
Virus With Notepad
Step 7: Open a Meterpreter Session so that the Trojan can connect back to you
For this step, please visit How to use Meterpreter when controlling a Trojan. Make sure that you use your ip address (the ip address of the computer running Kali and the one that you used when creating the trojan) and also use the same exploit: windows/meterpreter/reverse_tcp
Virus Scripts For Notepad
If you are looking to create a Trojan for Mac OSX
In conclusion:
- We updated Kali Linux in order to keep everything working.
- We generated a payload in metasploit with our IP address and listening port as parameters.
- We waited for the victim to run the trojan, which in turn allowed us remote access to the victim’s computer and file system.
Notepad Virus Codes
If you want to try this yourself but don’t have Kali Linux available to you, you can buy a live USB containing Kali Linux right here.