PIC OF THE DAY

PIC OF THE DAY
CELEBRATION ' S

Friday, November 16, 2007

Excellent tutorials on viruses,backdoors,hacking

visit
http://vx.netlux.org/lib/static/vdat/tutorial.htm

Features include:

Dark Angel's Phunky Virus Writing Guide #1
Dark Angel's Phunky Virus Writing Guide #2
Dark Angel's Phunky Virus Writing Guide #3
Dark Angel's Phunky Virus Writing Guide #4
Dark Angel's Phunky Virus Writing Guide #5
Scan Strings, How They Work and How To Avoid Them
An Introduction to Non Overwriting Virii #1
An Introduction to Non Overwriting Virii #2 (EXE)
An Introduction to Non Overwriting Virii #3 (SYS)
Code Optimisation, A Beginner's Guide
Advanced Polymorphism Primer
System File Tables and Their Usage
EXE Self-Disinfection
Boot Infectors
UMB Residency

Rock Steady:

Disinfecting an infected file
TSR COM Infections
Constructing Kit on infecting .COM
Infection on Closing
EXE Infections Part 1
EXE Infections Part 2
Directory Stealth Part 1
Directory Stealth Part 2
Memory Stealth

Black Wolf (AKA Stormbringer) Virology 101:

Batch File Viruses
Virus in C
COM Viruses
EXE Viruses
Combined Viruses
Memory Resident Viruses

VLAD :

Backdoors (Qark)
Find First/Next Infection (Darkman)
TSR Tutorial (Qark)
Windows Executable Infection (Qark/Quantum)
Calling the Windows API in Assembly Language (Qark)
Advanced Bait Detection (Coke)
Introducing Windows 95 (Qark/Quantum)
MCB Stealth (Darkman)
A Humble Polymorphic Primer (Absolute Overlord)
Boot Sector Infection (Qark)

Digital Anarchy:

Virusprogramming (basics) #1 (Drako)
Virusprogamming (not not basic) #2 (Trurl)
Memory Residence Methods (Zarathustra)
Directory Stealth (FCB) (WMA)
Encryption Part 1 (Lapidario)

SLAM:

Overwriting Virus (Stealth Warrior)
Appending .COM virus (Stealth Warrior)
Appending .EXE virus (Stealth Warrior)
Combo Virus (Stealth Warrior)
Overwriting Virii (Virtual Daemon)
Direct COM infection tutorial (Virtual Daemon)
Direct EXE infection tutorial (Virtual Daemon)
MBR/BS Infections (Virtual Daemon)
Simple Tutorial to Stealth Virii - Part #1 - Size Stealth #1 (Virtual Daemon)
Simple Tutorial to Stealth Virii - Part #2 - Size Stealth #2 (Virtual Daemon)
Simple Tutorial to Stealth Virii - Part #3 - Full Stealth (Virtual Daemon)
Simple Tutorial to Stealth Virii - Part #4 - Redirection Stealth (Virtual Daemon)
Word 6/95 and 97 Tips n' Tricks - Part 1 (Hyperlock)
How to encrypt WordBasic and VBA code (Nightmare Joker)
An idiot guide to polymorphic engines (Trigger)

Sepultura Post Discovery Strategies:

Polymorphism
Anti-Bait Techniques
Anti-Debug Techniques
Protecting Your Infection

Codebreakers:

Lesson 1: The Overwriting Virus (Horny Toad)
Lesson 2: The COM Appending Virus (Horny Toad)
Lesson 3: The Memory Resident Virus Primer (Horny Toad)
Lesson 4: Guide To EXE Infection (Horny Toad)
MS-Word Macro Viruses (Spooky)
An effort to help the naked virus part 1 (Sea4)
An effort to help the naked virus part 2 (Sea4)
Avoiding Detection (Arsonic)
Virus "Add-Ons" (Opic)
Introductory Primer To Polymorphism in Theory and Practice (Opic)
The Only VBA Tutorial You Will Ever Need (VicodinES / Lord Natas)
What is "Class Object Infection"? (VicodinES)
Macro Virus Tutorial - Simple Stealth (SerialKiller)
Reverse Engineering: The Viral Approach (Horny Toad / Opic)
Windows Compatible BS/MBR and Multipartite Viruses
Why use encryption in your macro virus

Ratboy:

Ratboy's Overwriting Viruses Tutorial Part 1
Ratboy's Overwriting Viruses Tutorial Part 2

Blonde:

Size Stealth. (Blonde / The Unforgiven)
Full Stealth. (Blonde / The Unforgiven)

Methyl:

Tunneling with Single Step Mode
Tunneling with Code Tracing Single Step Mode
Tunneling via Mini-Tunnelers
Development of Emulation Systems
Viral Technology - Past, Present, Future (Essay)

Lord Julus:

A Guide to Multipartite Infectors
Polymorphism - Analysis on the Decryptor Generator
Polymorphism Tutorial Part II v1.0 - Advanced Approach
Lord Julus' Anti-Debugger & Anti-Emulator Lair
Accessing Windows 95 API's by scanning PE-tables
Infecting the Portable EXE
Appending to the PE file (Lord Julus)
Ring 0 Residency under Windows 95/98
Win32 Residency
Compression - (Part I)

Archive Infection tutorials:

Infection on Compression (MGL/SVL)
Archive Infectors: Generalities (Unknown Mnemonik)
Dropping & Companioning over ZIP Archives (Unknown Mnemonik)
Dropping over ARJ Archives (Unknown Mnemonik)
Dropping over RAR Archives (Unknown Mnemonik)
Dropping over Compression alternative formats: HA & ACE (Unknown Mnemonik)
Dropping over old Archives. A view on the past, LZH, ARC/PAK, ZOO, CRC16
Heuristics for antivirus / archiving detection (Rajaat)

Anti-anti-virus tutorials:

Thunderbyte Anti Virus (TBAV):
Kohntarks Anti-TBAV techniques
TBAV Terminology
A brand new way to fool TBSCAN (Automag)
Thunderbyte Residency Test (Rhincewind)
Anti-TBClean (Ghost)
Full Thunderbyte Stealth
TBMEM Flaws (Darkman)
TBSCAN Flags (Qark)

Central Point Anti Virus
Central Point Anti Virus (CPAV)

F-Prot
Chilling Fridrik

AVP
AVP 2.2 Naked

Anti-Anti-virus Tricks (Mnemonix)
Resist! (Mouth of Sauron)
Single Step Tunnel Techniques 1 (Dark Fiber)
Single Step Tunnel Techniques 2 (Dark Fiber)

Miscellaneous Tutorials:

The Virus Writer's Handbook (Terminator Z)
Billy BelcebĂș Virus Writing Guide 1.04
A Basic Virus Writing Primer(Chili)
Small Payload Tutorial (AcidBytes)
Virii part 1 by Desperation (Disinfecting On-the-Fly)
Virii part 2 by Desperation (Simple TSR)
Virii part 3 by Desperation (Simple Parasitic)
Virii part 4 by Desperation
Mephistopheles' guide to viral programming (largely unfinished)
Theory Of Better File Virus Distribution (VicodinES)
Batch Viruses by Wavefunc - Issue #2
Batch Viruses by Wavefunc - Issue #3
Hidden Strengths of the DOS Batch Language
Batch Virii (Knowdeth)
Ye Olde Art of Ye Batch Viruses
Simple Batch File Viruses Explained (Linux Pir8)
Glitch's Polymorphic Batch Tutorial (Glitch)
Document Macro Viruses. (Joel McNamara)
Macro Virus Tutorial Part 1 (Dark Night)
Macro Virus Tutorial Part 2 (Dark Night)
A phreaky macro primer 0.1 (jackie twoflower)
The Underground MS Word 6.X Macro Viruses FAQ (Aurodreph)
Word Macro Viruses (Bozo)
Neophyte's Macro Virus Tutorial
Cyber-Magazine #1 (Macro virus)
VBA Viruses and Trojans (29A)
Advanced Macro Virus Techniques #1 (Alchemy)
Macro virus trickz (Jacky Qwerty)
Word 97: How the hell can I make a Word 97 virus?
The Basic Of Excel Virus Writing (Foxz)
Macro Virus Tutorial for Word (Ultras)
Macro Virus Payload Tutorial (Part 1) (Black Knight)
Cross Infection Tutorial for Office'97 Part I (Reptile)
Cross Infection Tutorial for Office'97 Part II (VicodinES)
Simple Stealth for your macro virus (jackie twoflower)
Tricks to make your macro virus unscannable (jackie twoflower)
Primer in macro polymorphism (virtual life)
'Add Module Infection' Technic (jackie twoflower)
MS Project Infections (jackie twoflower)
ActiveX/COM Technology and Viruses (1nternal)
An Examination Of The Security Risks Associated With The Java Platform (Landing Camel)
Methods Behind A Polymorph Engine (Black Baron)
Mutation Engines (JHB)
Guide to improving Polymorphic Engines (Rogue Warrior)
Argument for slow infection and slow polymorphism (Rogue Warrior)
Polymorphism (The Executioner)
Generic Polymorphism (Rajaat)
1nternal's Resource Based Polymorphism [RBP] - Research Project
Do Polymorphism Tutorial (Qozah)
Polymorphism and Grammars (Qozah)
Win32 Polymorphism (Billy Belcebu)
Defeating The Perfect Emulator (Bhunji)
Compatible, Resident Windows 95 Viruses (DV8)
Making Windows 95 Compatibel Viruses
How to infect DOS32 protected mode .EXE files (Dark Fiber)
PE Infection School (JHB)
PE infection under Win32 (29A)
Win32 PE Infection Tutorial (Qozah)
Win32asm intro and PE infection
Win32 VX Tutorial (Mort)
Virus oriented VxD writing tutorial (Griyo)
The VxDCall backdoor (Griyo)
Ideas and Theoryes on PE infection (Bozo)
Win95 Structures and Secrets (Murkry)
Simple Ring-0 Tutorial
Residence in Windows viruses at Ring-3 level
EPO - Entry Point Obscuring
Short Introduction to EPO (DoxtorL)
The SFT stealth tutorial (MGL/SVL)
Stealth, A Handy Overview (MGL)
Directory Infection (Buz)
Your First Lesson in Boot infection
Self Checking Executable Files (Demogorgon)
Finding INT 21's real address using the PSP
Upper Memory Residency (IntrusO)
Resident Virii Writers' Tutorial (LovinGOD)
Guide to Resident Viruses (Cdr PVC/Invaders)
Writing TSR Viruses (EXE-Gency)
Interleaved Encryption Technique (Stomach Contents)
Encryption, Scan Strings and You (Feathered Serpents)
Encrypting the Delta Routine - Part I
Encrypting the Delta Routine - Part II
An Introduction To Encryption, Part I (MidNyte)
An Introduction To Encryption, Part II (MidNyte)
A different way to make a TSR virus (Somniun)
Playing "Hide and Seek" (Q the Misanthrope)
HMA Residency (Q the Misanthrope)
Little SYS Infection Tutorial (Int13h)
Mid-infections on relocations (Bozo)
VirCOM 1 - Prepending COM Infectors
Six Ways For Infect A COM (Int 13h)
Companion Viruses for 16 and 32 bits (Int 13h)
COM Infections (BadgerX)
EXE Infections (BadgerX)
Infecting OBJs (Int13h)
Virus "Add-Ons" Revisited (GeneCode)
Viric life and die theories
Spreading & Survival Techniques for Viruses
Harder To Detect
Virus Algorithm Analysis
New Instructions Tutorial (Qozah)
Heuristic Technology (Billy BelcebĂș)
Anti Heuristics Techniques (Black Jack)
Jerk1N's Tutorial Series (Jerk1N)

Parasitic COM Infection
Memory Addressing
Anti-Removal
Anti-Bait
NE EXE Infection

UNIX Viruses
UNIX ELF Parasites and virus
Linux Virus Writing Tutorial (Mandragore)
Replicating Entity (iWorm-Net)(PZest)

No comments: