home *** CD-ROM | disk | FTP | other *** search
- ---
-
- WARNING: This book contains complete source code for live
- computer viruses which could be extremely dangerous in the hands
- of incompetent persons. You can be held legally liable for the
- misuse of these viruses, even if such misuse is unintentional. Do
- not attempt to execute any of the code in this book unless you
- are well versed in systems programming for personal computers,
- and you are working on a carefully controlled and isolated
- computer system.
-
- ---
-
- The Little Black Book Of Computer Viruses
-
- Volume One:
-
- The Basic Technology
-
- By Mark A. Ludwig
-
- American Eagle Publications, Inc.
- Post Office Box 41401
- Tucson, Arizona 85717
- - 1991 -
-
- And God saw that it was good,
- And God blessed them, saying
- "Be fruitful and multiply."
-
- Genesis 1:21,22
-
-
-
-
-
-
- ============
- INTRODUCTION
- ============
-
-
- This is the first part in a series of three books about
- computer viruses. In these volumes, I want to challenge you to
- think in new ways about viruses, and break down false concepts
- and wrong ways of thinking, and go on from there to discuss the
- relevance of the computer viruses in today's world. These books
- are not a call to a witch hunt, or manuals for protecting
- yourself from viruses. On the contrary, they will teach you how
- to design viruses, deploy them, and make them better. All three
- volumes are full of source code for viruses, including both new
- and well known varieties.
-
- It is inevitable that these books will offend some people.
- In fact, I hope they do. They need to. I am convinced that
- computer viruses are not evil and that programmers have the right
- to create them, posses them and experiment with them. That kind
- of a stand is going to offend a lot of people, no matter how it
- is presented. Even a purely technical treatment of viruses which
- simply discussed how to write them and provided some examples
- would be offensive. The mere thought of a million well armed
- hackers out there is enough to drive some bureaucrats mad. These
- books go beyond a technical treatment, though, to defend the idea
- that viruses can be useful, interesting, and just plain fun. That
- is bound to prove even more offensive. Still, the truth is the
- truth, and it needs to be spoken, even if it is offensive. Morals
- and ethics cannot be determined by a majority vote, any more than
- they can be determined by the barrel of a gun or loud mouth.
- Might does not make right.
-
- If you turn out to be one of those people who gets offended
- or upset, or if you find yourself violently disagreeing with
- something I say, just remember what an athletically minded friend
- of mine once told me: "No pain, no gain." That was in reference
- to muscle building, but the principle applies intellectually as
- well as physically. If someone only listens to people he agrees
- with, he will never grow and he'll never succeed beyond his
- little circle of yes-men. On the other hand, a person who listens
- to different ideas at the risk of offense, and who at least
- considers that he might be wrong, cannot but gain from it. So if
- you are offended by something in this book, please be critical -
- both of the book and of yourself- and don't fall into a rut and
- let someone else tell you how to think.
-
- From the start I want to stress that I do not advocate
- anyone's going out and infecting an innocent party's computer
- system with a malicious virus designed to destroy valuable data
- or bring their system to a halt. That is not only wrong, it is
- illegal. If you do that, you could wind up in jail or find
- yourself being sued for millions. However, this doesn't mean that
- it is illegal to create a computer virus and experiment with it,
- even though I know some people wish it was. If you do create a
- virus, though, be careful with it. Make sure you know it is
- working properly or you may wipe out your own system by accident.
- And make sure you don't inadvertently release it into the world,
- or you may find yourself in a legal jam... Even if it was just an
- accident. The guy who loses a year's worth of work may not be so
- convinced that it was an accident. And soon, it may be illegal to
- infect a computer system (even your own) with a benign virus
- which does no harm at all. The key word here is responsability.
- Be responsible. If you do something destructive, be prepared to
- take responsability. "The program included in this book could be
- dangerous if improperly used. Treat them with the respect you
- would have for a lethal weapon."
-
- This first of three volumes is a technical introduction to
- the basics of writing computer viruses. It discusses what a virus
- is and how it does its job, going into the major functional
- components of the virus, step by step. Several different types of
- viruses are developed from the ground up, giving the reader
- practical how-to information for writing viruses. That is also a
- prerequisite for decoding and understanding any viruses one may
- run across in his day to day computing. Many people think of
- viruses as sort of a black art. The purpose of this volume is to
- bring them out of the closet and look at them matter-of-factly,
- to see them for what they are, technically speaking: computer
- programs.
-
- The second volume discusses the scientific applications of
- computer viruses. There is a whole new field of scientific study
- known as artificial life (AL) research which is opening up as a
- result of the invention of viruses and related entities. Since
- computer viruses are functionally similar to living organisms,
- biology can teach us a lot about them, both how they behave and
- how to make them better. However, computer viruses also have the
- potential to teach us something about living organisms. We can
- create and control computer viruses in a way that we cannot yet
- control living organisms. This allows us to look at life
- abstractly to learn about what it really is. We may even reflect
- on such great questions as the beginning and subsequent evolution
- of life.
-
- The third volume of this series discusses military
- applications for computer viruses. It is well known that computer
- viruses can be extremly destructive, and that they can be
- deployed with minimal risk. Military organizations throughout the
- world know that too, and consider the possibility of viral attack
- both a very real threat and very real offensive option. Some high
- level officials in various countries already believe their
- computers have been attacked for political reasons. So the third
- volume will probe military strategies and real-life attacks, and
- dig into the development of viral weapon systems, defeating anti-
- viral defenses, etc.
-
- You might be wondering at this point why you should spend
- time studying these volumes. After all, computer viruses
- apparently have no commercial value apart from their military
- applications. Learning how to write them may not make you more
- employable, or give you new techniques to incorporate into
- programs. So why waste time with them, unless you need then to
- sow chaos among your ennemies? Let me try to answer that: Ever
- since computers were invented in the 1940's, there has been a
- brotherhood of people dedicated to exploring the limitless
- possibilities of these magnificent machines. This brotherhood has
- included famous mathematicians and scientists, as well as
- thousands of unnamed hobbyists who built their own computers, and
- programmers who love to dig into the heart of their machines. As
- long as computers have been around, men have dreamed of
- intelligent machines which would reason, and act without being
- told step by step just what to do. For many years this was purely
- science fiction. However, the very thought of this possibility
- drive some to attempt to make it a reality. This "artificial
- intelligence" was born. Yet AI applications are often driven by
- commercial interests, and tend to be colored by the fact. Typical
- results are knowledge bases and the like - useful, sometimes
- exciting, but also geared toward putting the machine to use in a
- specific way, rather that to exploring it on its own terms.
-
- The computer virus is a radical new approach to this idea of
- "living machines." Rather that trying to design something which
- poorly mimics highly complex human behavior, one starts by trying
- to copy the simplest of living organisms. Simple one-celled
- organisms don't do very much. The most primitive organisms draw
- nutrients from the sea in the form of inorganic chemicals, and
- take energy from the sun, and their only goal is apparently to
- survive and to reproduce. They aren't very intelligent, and it
- would be tough to argue about their metaphysical aspects like
- "soul." Yet they do what they were programmed to do, and they do
- it very effectively. If we were to try to mimic such organisms by
- building a machine - a little robot - which went around
- collecting raw materials and putting them together to make
- another robot, we would have a very difficult task on our hands.
- On the other hand, think of a whole new universe - not this
- physical world, but an electronic one, which exists inside of a
- computer. Here is the virus' world. Here it can "live" in a sense
- not too diffrentt from that of primitive biological life. The
- computer virus has the same goal as a living organism - to
- survive and to reproduce. It has environmental obstacles to
- overcome, which could "kill" it and render it inoperative. And
- once it is released, it seems to have a mind of its own. It runs
- off in its electronic world doing what it was programmed to do.
- In this sense it is very much alive.
-
- There is no doubt that the beginning of the life was an
- important milestone in the history of the earth. However, if one
- tries to consider it from the viewpoint of inanimate matter, it
- is difficult to imagine life as being much more than a nuisance.
- We usually assume that life is good and that it deserves to be
- protected. However, one cannot take a step further back and see
- life as somehow beneficial to the inanimate world. If we consider
- only the atoms of the universe, what difference does it make if
- the temperature is seventy degrees farenheit or twenty million?
- What difference would it make if the earth were covered with
- radioactive materials? None at all. Whenever we talk about the
- environment and ecology, we always assume that life is good and
- that it should be nurtured and preserved. Living organisms
- universally use the inanimate world with little concern for it,
- from the smallest cell which freely gathers the nutrients it
- needs and pollutes the water it swims in, right up to the man who
- crushes up rocks to refine the metals out of them and build
- airplanes. Living organisms use the material world as they see
- fit. Even when people get upset about something like strip
- mining, or an oil spill, their point of reference is not that of
- inanimate nature. It is an entirely selfish concept (with respect
- to life) that motivates them. The mining mars the beauty of the
- landscape - a beauty which is in the eye of the (living) beholder
- - and it makes it unhabitable. If one did not place a special
- emphasis on life, one could just as well promote strip mining as
- an attempt to return the earth to its pre-biotic state!
-
- I say all of this not because I have a bone to pick with
- ecologists. Rather I want to apply the same reasoning to the
- world of computer viruses. As long as one uses only financial
- criteria to evaluate the worth of a computer program, viruses can
- only be seen as a menace. What do they do besides damage valuable
- programs and data? They are ruthless in attempting to gain access
- to the computer system resources, and often the more ruthless
- they are, the more successful. Yet how does that differ from
- biological life? If a clump of moss can attack a rock to get some
- sunshine and grow, it will do so ruthlessly. We call that
- beautiful. So how different is that a computer virus attaching
- itself to a program? If all one is concerned about is the
- preservation of inanimate objects (which are ordinary programs)
- in this electronic world, then of course viruses are a nuisance.
-
- But maybe there is something deeper here. That all depends
- on what is most important to you, though. It seems that modern
- culture has degenerated to the point where most men have no
- higher goals in life than to seek their own personal peace and
- prosperity. By personal peace, I do not mean freedom from war,
- but a freedom to think and believe whatever you want without ever
- being challenged in it. More bluntly, the freedom to live in a
- fantasy world of your own making. By property, I mean simply an
- ever increasing abundance of material possessions. Karl Marx
- looked at all of mankind and said that the motivating force
- behind every man is his economic well being. The result, he said,
- is that all of history can be interpreted in terms of class
- struggles - people fighting for economic control. Even though
- many in our government decry Marx as the father of communism, our
- nation is trying to squeeze itself into the straight jacket he
- has laid for us. That is why two of George Bush most important
- campaign promises were "four more years of prosperity" and "no
- new taxes." People vote for their wallets, even when they know
- the politicians are lying through their teeth.
-
- In a society with such values, the computer becomes merely a
- resource which people use to harness an abundance of information
- and manipulate it to their advantage. If that is all there is to
- computers, then computer viruses are a nuisance, and they should
- be eliminated. Surely there must be some nobler purpose for
- mankind than to make money, though, even though that may be
- necessary. Marx may not think so. The government may not think
- so. And a lot of loud-mouthed people may not think so. Yet great
- men from every age and every nation testify to the truth that man
- does have a higher purpose. Should we not be as Socrates, who
- consider himself ignorant, and who sought Truth and Wisdom, and
- valued them more highly than silver and gold? And if so, the
- question that really matters is not how computers can make us
- wealthy or give us power over others, but how they might make us
- "wise". What can we learn about ourselves? About our world and,
- yes, maybe even about God? Once we focus on that, computer
- viruses become very interesting. Might we not understand life a
- little better if we can create something similar, and study it,
- and try to understand it? And if we understand life better, will
- we not understand our lives, and our world better as well?
-
-
- A word of caution first: Centuries ago, our nation was
- etablished on philosophical principles of good government, which
- were embodied in the Declaration of Independence and
- Constitution. As personal peace and prosperity have become more
- important than principles of good government, the principles have
- been manipulated and redefined to suit the whims of those who are
- in power. Government has become less and less sensitive to civil
- rights, while it has become easy for various political and
- financial interests to manipulate our leaders to their adventage.
-
- Since people have largely ceased to challenge each other in
- what they believe, accepting instead the idea that whatever you
- want to believe is OK, the government can no longer get people to
- obey the law because everyone believes in a certain set of
- principles upon which the law is founded. Thus, government must
- coerce people into obeying it with increasingly harsh penalities
- for disobedience - penalities which often fly in the face of long
- established civil rights. Furthermore, the government must
- restrict the average man's ability to seek recourse. For example,
- it is very common for the government to trample all over long-
- standing constitutional rights when enforcing the tax code. The
- IRS routinely forces hundreds of thousands of people to testify
- against themselves. It routinely puts the burden of proof on the
- accused, seizes his assets without trial, etc., etc. The bottom
- line is that it is not expedient for the government to collect
- money from its citizens if it has to proove their tax documents
- wrong. The whole system would break down in a massive overload.
- Economically speaking, it is just better to put the burden of
- proof on the citizen, Bill of Rights or no.
-
- Likewise, to challenge the government on a question of
- rights is practically impossible, unless your case happens to
- serve the purposes of some powerful special interest group. In a
- standard courtroom, one often cannot even bring up the subject of
- constitutional rights. The only question to be argued is whether
- or not some particular law was broken. To appeal to the Supreme
- Court will cost millions, if the politically motivated justices
- will even condescend to hear to case. So the government becomes
- pratically all-powerful, God walking on earth, to the common man.
- One man seems to have little recourse but to blindy obey those in
- power.
-
-
- When we start talking about computer viruses, we're treading
- on some ground that certain people want to post a "No Trepassing"
- sign on. The congress of the United States has considered a
- "Computer Virus Eradication Act" which would make it a felony to
- write a virus, or for two willing parties to exchange one. Never
- mind that the constitution garantees freedom of speech and
- freedom of the press. Never mind that it garantees the citizens
- the right to bear military arms (and viruses might be so
- classified). While that law has not passed as of this writing, it
- may by the time you read this book. If so, I will say without
- hesitation that it is a miserable tyranny, but one that we can do
- little about... for now.
-
- Some of our leaders may argue that many people are not
- capable of handling the responsability of power that comes with
- understanding computer viruses, just as they argue that people
- are not able to handle the power of owning assault rifles or
- machine guns. Perhaps some cannot. But I wonder, are our leaders
- any better able to handle the much more dangerous weapons of law
- and limitless might? Obviously they think so, since they are busy
- trying to centralize all power into their own hands. I disagree.
- If those in government can handle power, then so can the
- individual. If the individual cannot, then neither can his
- representatives, and our end is either tyranny or chaos anyhow.
- So there is no harm in attempting to restore some small power to
- the individual.
-
- But remember: truth seekers and wise men have been
- persecuted by powerful idiots in every age. Although computer
- viruses may be very interesting and worthwhile, those who take an
- interest in them may face some serious challenges from base men.
- So be careful.
-
- Now join with me and take the attitude of early scientists.
- These explorers wanted to understand how the world worked - and
- whether it could be turned to a profit mattered little. They were
- trying to become wiser in what's really important by
- understanding the world a little better. After all, what value
- could there be in building a telescope so you could see the moons
- around Jupiter? Galileo must have seen something in it, and it
- must have meant enough to him to stand up to the ruling
- authorities of his day and do it, and talk about it, and
- encourage others to do it. And to land in prison for it. Today
- some people are glad he did.
-
- So why not take the same attitude when it comes to creating
- life on a computer? One has to wonder where it might lead. Could
- there be a whole new world of electronic life forms possible, of
- which computer viruses are only the most rudimentary sort?
- Perhaps, they are the electronic analog of the simplest one-
- celled creatures, which were only the tiny beginning on life on
- earth. What would be the electronic equivalent of a flower, or a
- dog? Where could it lead? The possibilities could be as exciting
- as the idea of a man actually standing on the moon would have
- been to Galileo. We just have no idea.
-
- There is something in certain men that simply drives them to
- explore the unknown. When standing at the edge of a vast ocean
- upon which no ship ever sailed, it is difficult not to wonder
- what lies beyond the horizon just because the rules of the day
- tell you you're going to fall of the edge of the world (or
- they're going to push you off) if you try to find out. Perhaps
- they are right. Perhaps there is no value out there. Yet great
- explorers down trough the ages have explored other oceans and
- succeeded. And one thing is for sure: we'll never know if someone
- doesn't look. So I would like to invite you to climb aboard the
- little mast that I have built and go exploring...
- ---
- Bibliography on Viruses.
-
- The following is a list of books on the subject of computer
- viruses and virus-related topics that I have accumulated over the
- years. It is not meant to be all-inclusive or a complete guide
- on the subject and inclusion here is not to be concluded as being
- an endorsement of any sort.
-
- Aryeh Goretsky TEL: (408) 988-3832
- Mgr, Tech Support Dept FAX: (408) 970-9727
- McAfee Associates, Inc. BBS: (408) 988-3832
- 3350 Scott Blvd, Bldg 14 CIS: 76702,1714 Santa
- Clara, CA 95054-3107 Internet:
- aryehg@mcafee.COM
- _________________________________________________________________
-
- Burger, Ralf. COMPUTER VIRUSES: A HIGH-TECH DISEASE, 3rd Ed.
- Abacus Press, Grand Rapids, MI: 1989. 276pp
-
- ______, ____. COMPUTER VIRUSES AND DATA PROTECTION. Abacus
- Press, Grand Rapids, MI: 1991. 353pp
-
- Denning, Peter J., Ed. COMPUTERS UNDER ATTACK: INTRUDERS, WORMS
- AND VIRUSES, ACM PRESS: 1990. 554pp
-
- Ferreyra Cortes, Gonzalo. VIRUS EN LAS COMPUTADORAS (in Spanish),
- Macrobit, Miami, FL: 1990.
-
- Fites, Philip, Peter Johnston, and Martin Kratz. COMPUTER VIRUS
- CRISIS, THE, Van Nostrand Reinhold, NY: 1989. 171pp
-
- Haynes, Colin. THE COMPUTER VIRUS PROTECTION HANDBOOK, Sybex,
- Alameda, CA: 1990. 192pp
-
- Hoffman, Lance J, Ed. ROGUE PROGRAMS: VIRUSES, WORMS, AND TROJAN
- HORSES, Van Nostrand Reinhold, NY: 1990. 384pp
-
- Hruska, Jan. COMPUTER VIRUSES AND ANTI-VIRUS WARFARE. Ellis
- Horwood, Ltd., West Sussex, UK: 1990. 128pp
-
- Jacobson, Robert V. THE PC VIRUS CONTROL HANDBOOK, 2nd Edition,
- Miller Freeman Publications, NY: 1990. 162pp
-
- ________, ________. USING McAFEE ASSOCIATES SOFTWARE FOR SAFE
- COMPUTING. International Security Technology, NY: 1992. 143pp
-
- Jarvinen, Petteri. TIETOKONE VIRUKSET (in Finnish), Werner
- Soderstrom Osakeyhtio, Helsinki: 1990. 226pp
-
- Javeri, Harsh, and Suchit Nanda. WAR ON VIRUS, The Computer Book
- Shop, Bombay: 1990. 292pp
-
- Lundell, Allan. VIRUS! THE SECRET WORLD OF COMPUTER INVADERS THAT
- BREED AND DESTROY. Contemporary Books, Chicago: 1989. 189pp
-
- McAfee, John, and Colin Haynes. COMPUTER VIRUSES, WORMS, DATA
- DIDDLERS, KILLER PROGRAMS AND OTHER THREATS TO YOUR SYSTEM. St
- Martins, NY: 1988. 235pp
-
- The following books, while not specifically about computer
- viruses, contain information that may be of interest:
-
- Baker, Richard H. COMPUTER SECURITY HANDBOOK, 2nd Ed. TAB Books,
- Blue Ridge Summit, PA: 1991. 416pp
-
- DeMaio, Harry B. INFORMATION PROTECTION AND OTHER UNNATURAL
- ACTS., AMACOM, New York: 1992. 232pp
-
- Forester, Tom, and Perry Morrison. COMPUTER ETHICS: CAUTIONARY
- TALES AND ETHICAL DILEMMAS IN COMPUTING. MIT Press, Cambridge:
- 1990. 193pp
-
- Jennings, Karla. THE DEVOURING FUNGUS: TALES OF THE COMPUTER AGE,
- WW Norton & Co., NY: 1990. 237pp
-
- Mueller, Scott. QUE'S GUIDE TO DATA RECOVERY. QUE Corporation,
- Carmel, IN: 498pp
-
- National Research Council. COMPUTERS AT RISK: SAFE COMPUTING IN
- THE INFORMATION AGE. National Academy Press, Washington DC: 1991.
- 303pp
-
- Raymond, Eric, Ed. THE NEW HACKERS DICTIONARY., MIT Press,
- Cambridge: 1991. 433pp
-
- Rothman, David H. THE COMPLETE LAPTOP COMPUTER GUIDE, St Martins,
- NY: 1990. 384pp
-
- Sawicki, Ed. LAN DESKTOP GUIDE TO SECURITY, SAMS, Carmel, IN:
- 1992. 349pp
-
- Wilson, Ralph. HELP! THE ART OF COMPUTER TECHNICAL SUPPORT,
- Peachpit Press, Berkeley: 1991. 231pp
-
- =================================================================
-