the giant black book of computer viruses phần 6 pot

the giant black book of computer viruses phần 6 pot

the giant black book of computer viruses phần 6 pot

... data at the end of the file where the virus is hiding, the virus can defeat the read, or simply truncate it so that only the host is read. If the read requests data at the beginning of the file, ... to the file size. It adds enough bytes at the end of the file so that the number added at the start plus the end is always equal to 16. Then it can simply subtr...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 266
  • 0
the giant black book of computer viruses phần 3 potx

the giant black book of computer viruses phần 3 potx

... free at the time of the ;execution of the boot sector. ORG 0500H DISK_BUF: DB ? ;Start of the buffer ;Here is the start of the boot sector code. This is the chunk we will take out ;of the compiled ... takes the form that the sector/cylinder number in a call to the BIOS INT 13H read would require in the cx register, e.g., the sector number is in the low...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 383
  • 0
the giant black book of computer viruses phần 4 potx

the giant black book of computer viruses phần 4 potx

... writes. First, DEVIRUS finds the end of the host file and uses that as the offset for the new STRAT routine, writing this value into the header. Next it hides the address of the old STRAT routine internally ... STRAT routine internally in itself at STRJMP, and then writes the body of its code to the end of the SYS file. That’s all there is to it. The logic of D...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 292
  • 0
the giant black book of computer viruses phần 5 pot

the giant black book of computer viruses phần 5 pot

... code virush[] properly. The trick is to put a null in it right after the opening bracket of the declaration of virush[]: static char virush[]={49,52, . . . . . 63 ,68 ,61 ,72,20, 76, 69,72,75,73 ,68 ,5B,5D,3D,7B,0,7D, (c ... function and then disassemble it. the virus is run. Thus, all of Developer A and Developer B’s clients could suffer loss from the virus, regardless o...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 396
  • 0
the giant black book of computer viruses phần 7 pot

the giant black book of computer viruses phần 7 pot

... such techniques in the early 90’s. Some of the first viruses which employed such tech- niques were the 1 260 or V2P2 series of viruses. Before long, a Bulgarian who called himself the Dark Avenger ... bytes) and so on. Potentially RAND_INSTR will need classes with very limited capability, like (1), so we should include them. At the other end of the scale, the fancier yo...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 304
  • 0
the giant black book of computer viruses phần 8 pot

the giant black book of computer viruses phần 8 pot

... in the directory where the file is missing, and you don’t have integrity data for any of them anymore. You scan them, sure, but the scanner turns up nothing. Why was the file missing? Are any of ... much work. All one has to do is calculate the size of the file from the EXE header, rather than from the file system, and use that to add the virus to the file. An altern...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 345
  • 0
the giant black book of computer viruses phần 1 ppsx

the giant black book of computer viruses phần 1 ppsx

... far. Not so, the computer virus, because it attaches itself to otherwise useful programs. The computer user will execute these programs in the normal course of using the computer, and the virus ... autonomous from man was the science fiction of the 1950’s and 1 960 ’s. However, with computer viruses it has become the reality of the 1990’s. Just the idea that...
Ngày tải lên : 14/08/2014, 18:22
  • 67
  • 395
  • 0
the giant black book of computer viruses phần 2 pdf

the giant black book of computer viruses phần 2 pdf

... relative to the start of the code in the EXE file. This is relocated by DOS at load time. 18H 2 Reloc Tbl Offset Offset of the start of the relocation table from the start of the file, in ... in the EXE Header, to the location of HOSTS on disk in the above code. 5. Write the initial value of cs:ip in the EXE Header to the location of HOSTC on disk in...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 400
  • 0
the giant black book of computer viruses phần 9 pdf

the giant black book of computer viruses phần 9 pdf

... 193,45,129,137,84,159,159, 166 ,69 , 161 ,242,81,190,54,185,1 96, 58,151,49, 1 16, 131,19, 166 , 16, 251,188,125,1 16, 239,1 26, 69,113,5,3,171,73,52,114,252, 172,2 26, 23,133,180 ,69 ,190,59,148,152,2 46, 44,9,249,251,1 96, 85,39,154,184, ... 83,225,24,23,202,111,209,77,29,17,234,188,171,187,138,195, 16, 74,142,185, 111,155,2 46, 10,222,90 ,67 , 166 ,65 ,103,151 ,65 ,147,84,83,241,181,23...
Ngày tải lên : 14/08/2014, 18:22
  • 66
  • 334
  • 0
the giant black book of computer viruses phần 10 doc

the giant black book of computer viruses phần 10 doc

... follows: al=0 moves the pointer relative to the beginning of the file, al=1 moves the pointer relative to the current location, al=2 moves the pointer relative to the end of the file. Function ... Publications, Inc. for use in The Giant Black Book ;of Computer Viruses ; ;Version 1.00 ; Initial release - beta only ;Version 1.01 ; Upgrade to fix a number of bu...
Ngày tải lên : 14/08/2014, 18:22
  • 67
  • 281
  • 0