home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Collection of Hack-Phreak Scene Programs
/
cleanhpvac.zip
/
cleanhpvac
/
THCK200.ZIP
/
THCK200.DOC
< prev
Wrap
Text File
|
1992-05-10
|
6KB
|
103 lines
The Trojan Horse Construction Kit, v2.0: Development Tools!
(C) 1992, Stingray/VIPER.
Viral Inclined Programming Experts Ring
[----------------------------------------------------------------------------]
Well, after spending a few more hours of work on it, I have finally
finished this puppy up. I suppose I should give some info on it rather than
just bullshit up here, so let's get to the good stuff...
[----------------------------------------------------------------------------]
First thing to note: THCK-TC.EXE and THCK-TBC.EXE will >>ONLY<< work with
COM files. If you attempt to use THCK-TBC.EXE on an EXE or overlay of some
sort, then you will fuck the file over. THCK-TC.EXE will generate whatever
filename you specify, if you make an EXE, it will still execute, but only
because DOS sees there is no EXE header so it loads it like a COM file.
[-------------------------------<<< THCK-TC >>>------------------------------]
This is the actual trojan constructor. With this command line utility, you
can construct a trojan horse to your likings. It has less flexibility than
1.0, except that it is far more powerful with what it does. First, if you
don't have v1.0, then don't get it, because there are some bugs in the code
it generates. I have worked out bugs from here, except there are a few
limitations with the various functions.
First, all the destruction routines will default to attacking drive C. The
int 13 methods are more powerful than the 26, but 26 is a bit nicer and
still does plenty of damage. Some lame TSRs will not catch it. Most will
catch the int 13's. Funny thing is that int 26 just sets up parameters
using dos and calls int 13. Anyways, so if you are real worried, use that.
BUT, that will only trash a partition if the size is 32 megs or less. If the
partition is larger, then it will be completely unaffected.
There are two int 13 methods. The write sectors will completely pulverize
the partition table, MBR, and a good chunk of the beginning of the poor souls
hard drive. I have tested this out and it works nicely on my testing hard
drive. It will trash partitions of any size. And, the damage is kinda
sweet, since after it trashes the sectors, everything will seem okay, but
as soon as they reboot, it will make them re fdisk and format their drive
because they have no partition table. Hahahahahaha. The other method just
simply formats tracks. It does this WITHOUT setting up a proper parameter
block, and just takes a piece of memory and says that it will use that as its
guide to what to obliterate. So, this can also cause a pretty big mess, but
it all depends on what is in two registers at the time of trashing. If there
isn't anything fancy there, then it might not do very much.
Next, you need to specify three filenames to Trojan Constructor. The first
two are your messages, the third is the filename (do not include COM
extention; it will be appended automatically for you). The message files
can be up to 15,000 bytes long. They can be ASCII, ANSI pictures, or
just whatever the hell you want to make to display to your victim(s). Note
though, if you clear the screen, the first message may be cleared too fast
(It trashes quickly - well under a second). Nonetheless, I put in a function
that will allow you to run the output file without it causing damage so that
you can test it out and see how it looks to make sure it is cool.
You may now use somewhat variable encryption with the message files. This
is done by specifying a number 0-255 to add to each byte. It would not be
difficult to crack, but if you had a person who you wanted to look at it
with a hex editor, he would not see any text strings in it because it would
look jumbled. Nonetheless, that serves its purpose well.
For command line information, simply run the program and a screen will come
up telling you all the parameters.
[-------------------------------<<< THCK-FP >>>------------------------------]
This simple utility is a file size manipulator. With this, you can create
files of any length, pad out files to a specific length, or even append a
certain number of bytes to a file. To create a bogus file, simply specify
a filename which does not exist in the currently logged directory. Run
this, too, for a description of the command line interface.
[-------------------------------<<< THCK-TBC >>>-----------------------------]
This program is new to the Construction Kit. This powerful utility will
turn any COM program into a Time Bomb. Simply specify a COM file and a date,
and it will do the rest! Simply execute this alone for command line options.
Well, I hope that you people are able to cause some serious chaos with this.
Feel free to place time bombs on all your favorite COM ANSI designs by the
lamest of all cracker groups and shit like that. Rezip it up and send it
around. Scan 89 didn't say it was a virus, and it's not, so there shouldn't
be much problem with this at all. The file will run perfectly until the
date either is or has passed, when it will do the equivalent of the write
sectors function using int 13 in the trojan constructor. After all, the
best virus is the copy command - "Copy me, I want to travel" a famous virus
once tried to say.
[----------------------------------------------------------------------------]
Have fun with this shit...
Greetings...!: Decimator and the SKISM crew, Invalid Media and the NuKE
crew, and a big greet to The Evil Master.
Are you interested in supplying VIPER, or joining? Contact us on a decent
trashing oriented BBS near you!