home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacks & Cracks
/
Hacks_and_Cracks.iso
/
hackersguides-&-software
/
thck200b.zip
/
THCK200B.DOC
< prev
Wrap
Text File
|
1992-04-23
|
5KB
|
84 lines
The Trojan Horse Construction Kit, v2.0ß: Development Tools!
(C) 1992, Stingray/VIPER.
Viral Inclined Programming Experts Ring
[----------------------------------------------------------------------------]
It is finally here! Yes, the long awaited THCK, version 2.0ß. First, if
you have a copy of this program, I would like to make clear a few things.
A) This is a BETA test copy. I decided to release it early because
people were bugging me and because I thought it might help to get
some suggestions before finishing the final copy.
B) If you have this, please do not distribute it. I have chosen a few
sites which I felt had a cool enough SysOp to keep an eye out for who
is taking this prg. from them and is capable of keeping responsible
individuals on their board.
C) If I did not upload this to your board, then don't be pissed,
because I do not call out a whole lot myself so I do not really know
a whole lot of people. But, I like it this way.
[----------------------------------------------------------------------------]
Two files are currently included. Both are command line interfaced.
THCK-FP : This program will do several file size manipulation
functions. It can pad a file to a specific length, filling
the rest with bogus characters and leaving the rest of the
file in tact, append a certain number of bytes to a file,
and create new bogus data files. Do not make .COM files
larger than 65280 bytes, total length. It will leave the
original file in working order so that it can still be used
normally. The output from this is pretty much
uncompressable, so it makes a good "data" file type of thing.
THCK-TC : This is the actual Trojan Constructor. It is totally
different than v1.0. First and foremost, v1.0's .ASM code
that was generated was highly buggy, and most of it would
only trash drives which are 32 megs or smaller in partition
size. Second, it sucks having to have a compiler to make
a trojan out of it's output. Both of these have changed.
Now the output is directly to a .COM file, ready to execute,
or pad length. But, several other features/enhancements
were also added. Now, to specify your messages to display,
you specify a filename which contains the message you wish
to display to your victim. This file can be up to 15,000
bytes long. (There are two files - one to display before
destroying, and one to display after destroying). If you
were into drawing, these files can be ANSI pictures if you
like (just make sure the victim has their ANSI driver
loaded! <grin>). Nonetheless, the 'encryption' is now
variable and specifiable by the user. In the old version,
the encryption was stupid, simply adding 75 to each byte of
your message. Now you simply tell it the number you want to
add (0 = no encryption). This is really lame encryption, I
know, but it serves it's purpose for hex editors. Finally,
if you would like to see your trojan before sending it
somewhere, you can tell it not to generate any dangerous
code. Be careful if you use an ANSI which cleas the screen.
When the death mechanism is in place (which has been fixed
to destroy drive C: no matter the partition size), only takes
a split second.
[----------------------------------------------------------------------------]
Upcoming Tools in 2.0 Release: A Time Bomb/Trojan Constructor. This will
basically take any file you specify, and make it into a time bomb, at
whichever date you specify. It will continue to run properly, but will
not spread. However, those great utilities will definately get copied
a lot!
I am still working on making the Trojan Constructor generate .EXE files. I
HOPE to get it ready for 2.0, but I do not know. Same goes for the Time
Bomb Constructor. Currently, what I have done only will be able to "infect"
a .COM file. Hopefully this will be fixed.
Have a blast!
-> Stingray
Welcome to VIPER: Dr. Bios!