Hacking Step 14 - Introduction to Trojans,Viruses and Backdoors

I think everybody who is using computer has faced the problem of viruses at least once in life. In this Step I will going to Introduce What are Trojans,Viruses, Backdoors,worms etc. And How they work to infect the system. In later classes we will discuss more about them Like How to Get rid of Viruses, Trojans etc. How to remove them and the Most Important How to Use them for Hacking Victims systems etc..So Guys Keep Reading..


Lets Start With Viruses... What are These and How they Work..






VIRUSES:

Virus is a self-replicating program that produces its own code by attaching copies of itself into other executable codes like executive files(.exe) ,Dynamic link Library's(.dlls) etc..
Virus Generally operates in the background and offcourse without the Desire of the User as Noone want that virus to harm their computer..ROFL :P


Some Well known Characteristics of Viruses:

  • Resides in the memory and replicates itself while the program where it attached is running
  • Does not reside in the memory after the execution of program
  • Can transform themselves by changing codes to appear different
  • Hides itself from detection by three ways:
  1. • Encrypts itself into cryptic symbols (encodes themselves with special Characters)
  2. • Alters the disk directory data to compensate the additional virus bytes(changes the the location of the file by adding one additional bit to data location)
  3. • Uses stealth algorithms to redirect disk data
WORKING OF VIRUSES:
Generally most of the Viruses Works in two Phases:
1. Infection Phase
2. Attack Phase 
From the name you can have the Idea what are these Phases .

• Infection Phase:
– Virus developers decide when to infect host system’s programs
– Some infect each time they are run and executed completely.  Ex: Direct Viruses
– Some virus codes infect only when users trigger them which include a day, time, or a particular event
    Ex: TSR viruses which get loaded into memory and infect at later stages

• Attack Phase:
– Some viruses have trigger events to activate and corrupt systems
– Some viruses have bugs which replicate and perform activities like file deletion, increasing session time
– They corrupt the targets only after spreading completely as intended by their developers

It will be much more Clear From the Snapshot that How the Virus Works:

Fig: Infection Phase that How file is attached to .exe files to infect Programs.

Fig: Attack Phase that How the Files are got Fragmented and system speed Slows Down

Why People Create Viruses ??
I think Everybody thinking of that why people creates Viruses and which people Creates them.. hahahaha Real Question that comes to my Mind when I was Newbie in this field..
Some of he Most Common Reasons are Discussed Below:
• Research projects (People Doing Research Work Detect the Flaws in particular system and creates Code for that)
• Pranks(Just for fun like us people who just creates viruses for irritating frens)
• Vandalism
• To attack the products of specific companies (like Microsoft Products Xp,Vista,Windows 7 etc.)
• To distribute political messages
• Financial gain(Stealing Money from accounts etc..)
• Identity theft
• Spyware (to Monitor the Working of Remote Computers)

Enjoy and Have Fun!

5 comments:

Adams Joan said...

I want to testify about United blank atm cards which can withdraw money from any atm machines around the world. I was very poor before and have no job. I saw so many testimony about how United hackers send them the atm blank card and use it to collect money in any atm machine and become rich. I email them also and they sent me the blank atm card. I have use it to get 90,000 dollars. withdraw the maximum of 5,000 USD daily. United hackers  is giving out the card just to help the poor. Hack and take money directly from any atm machine vault with the use of atm programmed card which runs in automatic mode.

Email: unitedblankatmhackcard@gmail.com  

jane holly said...

CONTACT: onlineghosthacker247 @gmail. com
-Find Out If Your Husband/Wife or Boyfriend/Girlfriend Is Cheating On You
-Let them Help You Hack Any Website Or Database
-Hack Into Any University Portal; To Change Your Grades Or Upgrade Any Personal Information/Examination Questions
-Hack Email; Mobile Phones; Whatsapp; Text Messages; Call Logs; Facebook And Other Social Media Accounts
-And All Related Services
onlineghosthacker Will Get The Job Done For You
onlineghosthacker247 @gmail. com
TESTED AND TRUSTED!!!

felisha green said...


This professional hacker is absolutely reliable and I strongly recommend him for any type of hack you require. I know this because I have hired him severally for various hacks and he has never disappointed me nor any of my friends who have hired him too, he can help you with any of the following hacks:

-Phone hacks (remotely)
-Credit repair
-Bitcoin recovery (any cryptocurrency)
-Make money from home (USA only)
-Social media hacks
-Website hacks
-Erase criminal records (USA & Canada only)
-Grade change

Email: cybergoldenhacker at gmail dot com

Unknown said...

I can vouch for him because I have used him to monitor my husband many time when I feel suspicious about his movements TALENTED HACKERS DO YOU REQUIRE A CERTIFIED HACKER FOR : +University grades hack, +Bank account hacks, +Control devices remotely hack, +Facebook Hacking Tricks, +Gmail, AOL, Yahoomail, inbox, hack are available, +Database hacking, +PC computer tricks +Bank transfer, Western Union, money gram, Credit Card transfer +Wiping of credit, +VPN software, +ATM Hack we are the real deal when it comes to hacking, carding, WU transfer, Money Gram transfer etc contact us now on : ETHICALHACKERS009@GMAIL.COMcontact him for all kind of hacking job and you will be glad you did whatsapp+12132951376

Amalia Eva said...

Special thanks to (hackingsetting50@gmail.com) for exposing my cheating husband. Right with me i got a lot of evidences and proofs that shows that my husband is a fuck boy and as well a cheater ranging from his text messages, call logs, whats-app messages, deleted messages and many more, All thanks to

(hackingsetting50@gmail.com), if not for him i will never know what has been going on for a long time.

Contact him now and thank me later.

Post a Comment

STEALTH HACKER

Sponsers