1030 lines
54 KiB
Plaintext
1030 lines
54 KiB
Plaintext
**********************************************
|
||
The Crypt Newsletter [mid-Sept.'92]: another in
|
||
an infrequent series of factual, info-glutted,
|
||
tongue-in-cheek monographs solely for the enjoyment
|
||
of the virus programming professional or enthusiast
|
||
interested in the particulars of electronic mayhem.
|
||
|
||
-*-
|
||
|
||
Edited by URNST KOUCH.
|
||
**********************************************
|
||
|
||
This issue's quote: "It's a new hobby, folks."
|
||
--John Dvorak on virus programming, from the 2nd
|
||
edition of Dvorak's Telecommunications, Dvorak and Anis (McGraw-Hill).
|
||
*******************************************************************
|
||
|
||
IN THIS ISSUE: Local news...viruses for sale...condensed results of
|
||
NCSA scanner evaluation...viruses as tools of civil disobedience...
|
||
MacMag Peace virus dropper charged with crime...trojan programming
|
||
and stomping out the pernicious threat of hard core pornography...
|
||
Hans Von Braun, enlightened fellow...dummkopf of month award...
|
||
Nowhere Man's CRYPTCOM 2.0...Pallbearer's KONSUMER KORNER...
|
||
the CASINO virus...NUKEX...BATCOMPI trojan...the PENIS trojan...
|
||
CORRUPTO 2 and more.
|
||
|
||
|
||
NEWS! NEWS! NEWS! NEWS! NEWS!
|
||
|
||
Frans "Dutch" Hagelaars nee SomethingAndersswhateversomething,
|
||
Poobah of the Virus echo distributed on the FidoNet,
|
||
clamped down on the public domain Wizard's Retreat BBS
|
||
in Allentown, PA, for refusing to delete virus exchange sysop
|
||
Tim Caton (aka Pallbearer) from its caller base.
|
||
|
||
In order to preserve the transmission of the echo, Wizard
|
||
Retreat sysop Scott Miller has made the echo 'read-only'
|
||
for all local callers. He declined to delete user Caton.
|
||
|
||
In related news, Phalcon/SKISM's Night Crawler, the other
|
||
FidoNet virus echo user excommunicated in "Dutch's" late Summer
|
||
purge, reappeared in the waning days of August to wish Hagelaars
|
||
well.
|
||
|
||
"You, my good man, can go to HELL!" commented the SKISM member.
|
||
|
||
In unrelated news: We now reprint a fragment of a recent
|
||
post from FidoNet Virus echo user and 14-year assembly
|
||
programmer, Gary Watson. In it Watson protested his being
|
||
labeled a pampered menial by the Crypt Newsletter for constantly
|
||
being allowed to flame on topics which usually get 'lesser' users
|
||
barred.
|
||
|
||
"Why would I want to [pass viruses on FidoNet]? "I make a
|
||
point of *not* collecting them," claimed Mr. Watson.
|
||
|
||
Interested readers will be amused to find that the same
|
||
"Nixon" Watson was recently spotted uploading an archive
|
||
containing live samples and source code to BADBOY 2, DIAMOND,
|
||
DIR-2, OUTLAND, MURPHY, MG, MIX, HORSE, PINGPONG, 4096, LEECH,
|
||
AMSTRAD, CRAZYEDDIE, etc., to the DARK COFFIN BBS.
|
||
|
||
The Dark Coffin is hosted by the shunned & hated Caton and,
|
||
incidentally, seems to be the mailing address of this newsletter.
|
||
Small world, isn't it, Gary? Not a collector? INDEED.
|
||
|
||
ANYWAY, here at the Crypt newsletter, we reckon the Virus
|
||
echo and its users would be BETTER served if "Dutch" Hagelaars
|
||
took the following steps:
|
||
|
||
1. Discourage trivial posts like those generated by
|
||
Gyuri "George" K. GK's disjointed messages resemble
|
||
what can only be described as the distracting chatter
|
||
of a madman. Hey, try and keep it on the subject, eh?
|
||
[Oops, hope he's not DAV incognito!]
|
||
|
||
2. Time to consider instituting separate feeds to all nodes
|
||
where users persist in posting "SEKRIT" messages in Polish,
|
||
Danish, Slavonic, Chervonsky, Basque, Martian or whatever.
|
||
As an Ami Schwein, I speak only de Englise, dammit, and see
|
||
little value in wading through apocryphal messages which appear
|
||
to be written in ecthje fiudoaw resstetiii. (See what I mean?)
|
||
It's quite possible users from nether-Poo-Stink, Central Europe,
|
||
feel the same way about MY lingua franca. Do something
|
||
about this.
|
||
|
||
3. Encourage more exchange of detailed, high value info
|
||
relevant to virus study, i.e., ripped off copies of
|
||
Virus Bulletin, news briefs, more posting from Virus - L
|
||
Digest (the Crypt Newsletter, heh). At this point, the echo
|
||
is about as informative as the QModem users help group.
|
||
Rob Slade and Paul Ferguson are two who DON'T continually
|
||
transmit useless, anecdotal, horrifyingly re-quoted replies
|
||
to the fragmented discussions of others (see #1 for an
|
||
example). Many could learn from them. Time to tear the
|
||
lid off the source code ban, too. The cows have left
|
||
the barn, boys.
|
||
|
||
Until these steps are taken, the Virus echo will remain trivial.
|
||
"It's no big loss," said Caton. Res Ipso Loquitur.
|
||
|
||
Down on the Gulf of Mexico in Mission, TX, sysop Zendor of the
|
||
Other Side BBS has taken matters into his own hands and started
|
||
charging a small fee for bulk mail delivery of viruses,
|
||
source code, and related files. For $1.00 cash money,
|
||
Zendor will supply a catalog; for $10.00, a diskette of the
|
||
software in his archive.
|
||
|
||
Compared to the $15.00 asking price for "The Little Black Book of
|
||
Computer Viruses" (American Eagle Publishing, Tucson, AZ)
|
||
companion diskette, Zendor's terms seem quite fair. Mail him
|
||
at 1807 Cassandra, Mission, TX 78572, or call The Other Side
|
||
at 512-618-0154.
|
||
|
||
In related news, The Other Side is a member of the WWIV StormLink
|
||
net and sponsors the "Infected Files" sub nationwide. In its first
|
||
week, "Infected Files" posts included the source code for
|
||
the SARA GORDON virus (mistakenly posted at the MtE) and debug scripts
|
||
for the FELLOWSHIP and MIMIC2 viruses, among others. Sadly, it
|
||
didn't take long for someone to cry foul and threaten its closure
|
||
unless all source codes and hex dump transmissions were curtailed.
|
||
The punitive action achieved little, since virus exchange sysops
|
||
continued to freely trade advice and phone numbers at will. Now
|
||
izzit me, or are all net co-ordinators trained to be morons?
|
||
What difference is there between posting codes or BBS numbers
|
||
where codes and live viruses can be freely downloaded? A free
|
||
no-prize to you if you can explain it to me! Just another case
|
||
of the Emperor's New Clothes.
|
||
|
||
|
||
Symantec has taken the step of uploading a freeware version of the
|
||
Norton Antivirus's scan utility, NAVSCA.ZIP, to the IBMSYS and
|
||
VIRUSFORUM SIG's on COMPUSERVE. This is not the first time
|
||
a colorful commercial outfit has attempted to do battle with the
|
||
shareware market. Back at the time of the Michelangelo scare,
|
||
XTREE made available a free version of UNVIRUS, the scanning utility
|
||
from its VIRUSAFE package. About the only remarkable points about
|
||
XTREE's program where the amusing cheeping noises it made when
|
||
searching memory for 'stealth' viruses and the hysterically silly
|
||
virus descriptions: "Fill in your own virus - This virus is very
|
||
dangerous and will corrupt all the files on your system, eventually
|
||
totally destroying the disk!"
|
||
|
||
As for NAVSCAN's efficacy as a brute-force scanner against the
|
||
new crop of viral programs? We took it into the Crypt virus
|
||
lab and scooped up a handful of VCL 1.0 variants
|
||
(DIARRHEA 1 & 2, HEEVAHAVA and RED HERRING), a few direct action
|
||
infectors designed with VCL 1.0 but optimized to avoid detection
|
||
by SCAN v95B (MIMIC 1 & 2, DIOGENES) and two weirdos - COMMANDER
|
||
BOMBER and STARSHIP. The score? No hits. Here at the Crypt
|
||
Newsletter, we deem these results unsuitable for "optimum
|
||
consumer confidence." Even if it's free.
|
||
|
||
|
||
And now for your further infotainment, a newsbrief culled and cribbed
|
||
without permission from a post by FidoNet virus echo user Paul
|
||
Ferguson. Take it away (and thanks anyway), Paul!
|
||
|
||
Reprinted without permission from Federal Computer Week, 17 August 1992 -
|
||
(page 34)
|
||
|
||
8<-------- Cut Here ---------------
|
||
|
||
MOST VIRUS-DETECTION PRODUCTS SUCCESSFUL
|
||
by Richard A. Danca
|
||
|
||
Most PC virus-detection products do an excellent job of finding known
|
||
viruses on a PC, according to tests run by the National Computer
|
||
Security Association, Carlisle, Pa.
|
||
In NCSA's tests, 12 of 16 virus-detection products found more than 90
|
||
percent of the 848 viruses or virus variants in NCSA's database. Only
|
||
two of the products found fewer than 80 percent of the files.
|
||
NCSA tested all the products it received after announcing it would
|
||
conduct the tests, said membership director Paul R. Gates.
|
||
The association will run tests every month, and future tests will
|
||
probably include other virus detectors, he said. Questions remain,
|
||
however, about the validity of the tests and the hazards viruses pose.
|
||
Three products found 100 percent of the 848 viruses NCSA used in the
|
||
test: Virex-PC from Microcom Inc., Norwood, Mass.; Panscan from Panda
|
||
Systems, Wilmington, Del.; and Findviru from S&S International,
|
||
Berkhamsted, Hertfordshire, Britain.
|
||
NCSA uses the term "infected files" to refer to the viruses it tested
|
||
because many viruses are variants of others and because there are no
|
||
agreed-upon naming criteria, Gates said, nor did NCSA distinguish
|
||
between common and unusual viruses. "The common ones are in there with
|
||
the rare ones."
|
||
|
||
ONLY DETECTION WAS TESTED
|
||
|
||
NCSA tested only virus detection, not removal. Many viruses make it
|
||
impossible to re-create programs or data they have infected, so
|
||
detection is more important than removal, Gates said. "Mostly what
|
||
people do is restore [files] is not to run the remover capability but
|
||
to reinstall software" and restore data from backups. "That is the
|
||
correct way of doing it."
|
||
One company whose product scored low criticized NCSA's tests and
|
||
objectivity. Commcrypt Inc., Beltsville, Md., said the Scan Plus
|
||
portion of its Detect Plus software found 73 percent of 2,201 strains
|
||
of viruses in a February test NCSA ran. "In a nutshell, we're not
|
||
privy to the library we're tested against," said Warren Wertz,
|
||
research director at Commcrypt.
|
||
It is possible that some of the files in the NCSA database are "naked
|
||
viruses or benign viruses" that cannot damage data.
|
||
The NCSA database was available only to members of the Anti-Virus
|
||
Program Developers consortium who paid a membership fee, said
|
||
Commcrypt president William H. Landgraf. "If you're willing to pay the
|
||
money - $2,000 or more a quarter - they'll provide you with the list
|
||
of viruses."
|
||
In a certificate it issued to Commcrypt in February, NCSA said,
|
||
"Nearly all of these [2,201] strains have rarely or never been seen
|
||
'in the wild.' Scan Plus detected all common viruses."
|
||
Commcrypt has many customers in the U.S. Postal Service and the
|
||
federal courts, Wertz said. "They haven't got any viruses - that we
|
||
know about - that they couldn't get rid of," he said.
|
||
NCSA and other experts acknowledge that common viruses are far more
|
||
likely to cause damage. The most common viruses include strains of
|
||
Jerusalem, Stoned and Michelangelo, according to both NCSA and
|
||
Commcrypt. In addition, "some people estimate that 90 to 95 percent of
|
||
the data lost is because of operator error." Gates said.
|
||
"I have some question about scan tests of viruses that just exist in
|
||
the laboratories," said Bryan Seborg, PC and local area network
|
||
security program director at the Federal Deposit Insurance Corp.
|
||
Seborg is also a virus researcher and instructor at the University of
|
||
Maryland.
|
||
Seborg agreed with NCSA's Gates, however, on the limited value of
|
||
virus removers. "The ones that do a cleanup are not a good idea."
|
||
FDIC policy requires users to destroy infected files and reinstall
|
||
software, For viruses that destroy boot records or hidden MS-DOS
|
||
files, the FDIC solution is to use DOS' FDISK or SYS commands, Seborg
|
||
said.
|
||
|
||
AUGUST VIRUS SCANNER TEST RESULTS
|
||
|
||
VENDOR PRODUCT VERSION SCORE
|
||
|
||
Central Point CPAV 1.3* 94
|
||
Certus NOVI 1.1D 95
|
||
Commcrypt Detect Plus 2.10 60
|
||
Fifth Generation UTSCAN 24.00 90
|
||
Frisk Software F-PROT 2.04 99
|
||
IRIS CURE 20.01 93
|
||
Leprechaun Software Virus Buster 3.92 98
|
||
McAfee Associates SCAN 93 99
|
||
Microcom Inc. Virex-PC 2.2 100
|
||
Panda Software Panscan 4.05 100
|
||
RG Software Vi Spy 9.0 97
|
||
S&S International Findviru 5.60 100
|
||
Stiller Research Integrity Master 1.23A 88
|
||
Symantec NAV 2.0* 70
|
||
Trend Micro Devices PCSCAN 2.0 91
|
||
Xtree ViruSafe 4.6 86
|
||
|
||
|
||
* Test was run with the August version of the vendors' virus signature
|
||
definition file, which is available to their installed base.
|
||
|
||
[ Source: National Computer Security Association ]
|
||
|
||
[Readers of this issue of the Crypt newsletter are invited to
|
||
comment, no holds barred, on this study and Danca's article.
|
||
Send comments to The Dark Coffin BBS, 1-215-966-3576 or
|
||
leave mail for Couch on The Hell Pit.]
|
||
|
||
NEXT UP: THE COMPUTER VIRUS AS A TOOL OF INDIVIDUAL EMPOWERMENT
|
||
by THE FLIM-FLAM MAN
|
||
|
||
|
||
It's time to start thinking in real terms about the computer virus
|
||
as a tool for individual empowerment.
|
||
|
||
To avoid an overly windy essay, I'm going to focus on two REAL
|
||
human examples.
|
||
|
||
The first deals with a woman in her mid-40's who works for a small
|
||
specialty book publishing firm in the Lehigh Valley of eastern PA.
|
||
(I've kept the descriptions of individuals deliberately vague to
|
||
protect them from inappropriate attention.)
|
||
|
||
In early 1992 she found herself sexually harassed in the workplace by
|
||
her boss, a man for whom she felt no attraction. Unable to tell him
|
||
to bug off, and knowing that in a small business there
|
||
was no place to turn but the street, she became enraged. So she
|
||
planned a late night smash-and-grab raid into the office to delete
|
||
certain key files on his personal computer. This she did. The next
|
||
day her boss was confused, frustrated and angry over the loss of
|
||
his precious data. He did not hip to the fact that his work had
|
||
been sabotaged by the woman quietly smiling in the next room.
|
||
|
||
Given the opportunity to use a computer virus for the job,
|
||
it is not totally unreasonable to assume this woman would have
|
||
seriously entertained the idea of using it as a tool of redress.
|
||
In any case, she was a computer vandal. And not the computer vandal
|
||
most corporate stiffs like to paint: a maladjusted, teen or
|
||
disgruntled, shirking whiner. Rather, she was somewhere in between;
|
||
a reasonable worker pushed deep into a corner. As further food for
|
||
thought: Do you think that the use of a computer virus, IN THIS
|
||
INSTANCE, would have been BAD?
|
||
|
||
A second example: mid-level staffers at a large metropolitan corporation
|
||
in eastern Pennsylvania have had to grapple with the installation of
|
||
a project implemented on a Macintosh desktop system. The junior
|
||
technical administrator put in charge of bringing the system online
|
||
has not proven up to the challenge. After two years of work, the
|
||
system crashes daily, eats work, locks unpredictably and forces
|
||
continued overtime on staffers who have to work around its shortcomings.
|
||
The technical administrator is openly hostile to any suggestions
|
||
from staffers who are compelled to use the system daily. The
|
||
administrator's supervisor will not listen to suggestions from
|
||
underlings that more expert technical help is necessary. The project
|
||
has become a costly, political hot potato; its failure would mean
|
||
the rep of the management team that committed to it two years
|
||
previously.
|
||
|
||
At this point the staffers who must work with the non-functional system
|
||
daily have begun entertaining the idea of inserting a Mac virus into
|
||
the already deeply screwy system. The rationale for use is that it could
|
||
force a system crash which the current technical administrator could
|
||
not quickly remedy. Such a disaster might break the logjam of upper
|
||
management arrogance and force the consultation of someone better
|
||
suited to programming of Macintosh's. They also feel that since
|
||
viruses are anonymous, the blame would most likely fall on the
|
||
local administrator's head for allowing it to happen.
|
||
|
||
This is another graphic example of reasonable workers who feel they've
|
||
been backed into a corner by leaders who seem dumb as stumps.
|
||
The computer virus is viewed by the victimized as their road to
|
||
empowerment.
|
||
|
||
These workers are smart enough to realize that there
|
||
is no guarantee that a bad situation will be made better by a
|
||
virus. But they do think that throwing a monkey wrench into the
|
||
system, bringing it to a noisy, ugly halt, might buy some breathing
|
||
room.
|
||
|
||
As told here, I'm sure most readers WILL feel some empathy for
|
||
the people above. It's not a stretch to think of someone in the
|
||
same tight spot. And that is why, as the gap between managers and
|
||
grunts in a our technological society becomes wider, the computer
|
||
virus or rogue program will be seen more and more as one of THE tools
|
||
for empowerment.
|
||
|
||
Anyone who works in the corporate security field should be scared
|
||
white at this prospect. Because the hardest 'virus-droppers'
|
||
to fight will be the the honest, determined employees,
|
||
who become progressively alienated by the cynicism and indifference
|
||
from an organization they work for.
|
||
|
||
***********************************************
|
||
NEWS BREAK! NEWS BREAK! NEWS BREAK! NEWS BREAK!
|
||
***********************************************
|
||
|
||
NEWS clip from one of COMPUSERVE's free services:
|
||
|
||
Online Today
|
||
|
||
CANADIAN CHARGED WITH PLANTING ALDUS COMPUTER VIRUS
|
||
|
||
(Aug. 20)
|
||
Former Canadian computer magazine publisher Richard Brandow, 28,
|
||
has been accused of planting a computer virus that tainted thousands
|
||
of copies of Aldus Corp. software in 1988.
|
||
According to The Associated Press, Brandow, who now writes for
|
||
"Star Trek," has been charged by prosecutors in King County,
|
||
Washington with malicious mischief and could face up to 10 years in
|
||
on if he is convicted.
|
||
Brandow said he finds the charges surprising. "What are they going
|
||
to do?" he asked, "It happened four years ago, and I am here in
|
||
Montreal."
|
||
He told AP that he arranged for a message to flash briefly on
|
||
computer screens that wished peace "to all Macintosh users around the
|
||
s were designed to educate the public
|
||
to the danger of viruses. Brandow included his name in the message so
|
||
he could be contacted.
|
||
The virus made its way eventually to Aldus where it infected a
|
||
master disk for producing copies of Freehand, an illustration
|
||
program. After the virus was discovered, Aldus recalled 5,000 copies
|
||
of Freehand and replaced another 5,000 copies it had in its
|
||
inventory. The incident cost the firm $7,000.
|
||
Ivan Orton, King County senior deputy prosecuting attorney, told AP
|
||
it was the first time the state has brought such criminal charges. He
|
||
also said he believes the incident was the first time a virus had
|
||
tainted commercial software.
|
||
For more news from The Associated Press, consult the Executive News
|
||
Service.(GO APONLINE).
|
||
--Cathryn Conroy
|
||
|
||
[URNST KOUCH butts in: In this story, reporter Conroy is refering
|
||
to the MacMag Peace virus, commissioned by Brandau, then the editor of MacMag
|
||
magazine. Its trigger date of March 2, 1988, was the
|
||
first anniversary of the Mac II - at which time the virus displayed
|
||
the universal peace sign, or something to that effect. After Mar 2,
|
||
the virus erased itself. Why do the authorities always come up with
|
||
a charge YEARS later; a day late and a dollar short, so to speak? And by the
|
||
way, it is spelled "Brandau."]
|
||
|
||
IN SEARCH OF TROJAN PROGRAMMING or CRYPT NEWSLETTER's CAMPAIGN
|
||
AGAINST THE UNRESTRICTED FLOW OF PC PORNOGRAPHY
|
||
|
||
A good deal of this issue is devoted to helping the reader optimize
|
||
his planned trojan programs for real world success.
|
||
|
||
Let's face it, trojans which blindly sack the fixed disk and
|
||
contain unencrypted, embedded ASCI strings like "You're fucked now,
|
||
lamer!! Ahahahahaha!" don't cut it in the real world. Of course,
|
||
such trojans will always work against the PC initiate. But admit it,
|
||
that's about as much good sport as shooting fish in a barrel. No
|
||
challenge, no style. Far better to just put a ballpeen hammer through
|
||
the monitor and do some real damage.
|
||
|
||
A good trojan should distract the user. It should, perhaps, display a
|
||
fine graphic, send a cryptic error message to the monitor, or
|
||
appear to do . . . nothing. Good trojan programmers never stoop to that
|
||
old bromide, "You're fucked now, lamer!!"
|
||
|
||
So, to start, you will want to subscribe to Lee Jackson's HACK REPORT,
|
||
available at too many public electronic archives to count.
|
||
It's a fine guide and tells you just what's out there; it even
|
||
chronicles the more successful trojans. It is GOOD FOR IDEAS.
|
||
|
||
For example, in the pd world, many were duped by the XTRATANK trojan,
|
||
a genuinely clever and twisted set of programs that promised to
|
||
double a user's disk space free of charge. In reality XTRATANK placed
|
||
Michelangelo and Stoned virus onto the machine in two discrete steps.
|
||
XTRATANK batted directly to the average user's weakest spot: The
|
||
desire to gain something for nothing!
|
||
|
||
Upon installation, a portion of Michelangelo's code was copied
|
||
to the boot block of the disk. This was not enough to trigger any scanner.
|
||
After the user realized the program was doing nothing for him, he would
|
||
uninstall it, probably using the de-installation software.
|
||
The de-installation software copied the remainder of Michelangelo
|
||
to the boot block and inserted Stoned into memory. At this point,
|
||
a scan run reveals something seriously wrong. Many were sucked in by
|
||
XTRATANK.
|
||
|
||
But maybe you don't have the time or the will to come up with
|
||
an XTRATANK. Consider making trojans out of pornographic files.
|
||
It's easy, the trojans are simple to put into the wild and
|
||
serve a purpose: they burn users whose sexual tastes run to the
|
||
bizaare. For this purpose, I've included the code to a flashy, but crass,
|
||
display which writes an animated ANSI of a squirting gland directly to
|
||
the video page. Then it crushes the drive. The ANSI was converted
|
||
into code suitable for direct video writes by the most recent version
|
||
of the LAUGHING DOG screen maker. The utility of this code is that
|
||
ANSI.SYS does not have to be loaded, the graphic effect will take
|
||
quite nicely without it. (See the appendix file: PENIS.ASM.)
|
||
|
||
A second trojan is an update of CORRUPTO, something I designed
|
||
using VCL 1.0. CORRUPTO 2 will display the error message "Cannot
|
||
open lezbosex.dat/Critical errorlevel=25" when executed and
|
||
then drop a small proprietary Crypt program which can surgically
|
||
rewrite the partition onto an executable in the current directory.
|
||
Include CORRUPTO in an archive with at least one other V-loader of
|
||
wimmen getting it on with each other or something similar. (The idea
|
||
here is that Lesbian loaders are a hot download. It's true, they just
|
||
blow right out the door.) The user runs the first loader in the archive
|
||
and gets an eyeful. He starts polishing his knob and runs CORRUPTO 2.
|
||
Nothing but the error. Damn! Some cretin took the .DAT file out of
|
||
the archive, he thinks! Stupid pirates! (Don't forget to include
|
||
another dummy .DAT file for the real program, to make the sham filth
|
||
seem even more real.)
|
||
|
||
In reality, a partition bomb is now installed upon CORRUPTO,
|
||
the other V-loader, and any other executable in the directory.
|
||
When any one of these is invoked, the partition table on the C drive
|
||
of any 80286 and up machine will be silently and quickly rewritten.
|
||
The results will be somewhat disruptive to the days computing activity,
|
||
UNLESS the user has a back-up image of the partition saved off disk and
|
||
the wit to reload it.
|
||
|
||
There are other benefits in creating trojans for porn directories.
|
||
|
||
1] Victims never squeal. Most Americans are far too neurotic to
|
||
admit something bad happened to them while they were watching "dirty"
|
||
sex. Its like confessing to your girlfriend you have a problem
|
||
with horrible anal itching. It's just not done. So they may not even
|
||
inform the sysop, giving your trojan longer shelf-life.
|
||
|
||
2] Such trojans are deceptively simple to upload to 'adult'
|
||
directories, the bigger the better. Large adult directories
|
||
aren't well-supervised. Let's face it, even the biggest
|
||
pervert doesn't have enough time in the day to keep track
|
||
of all the squamous product he stocks. Do you think he's gonna look
|
||
at yours closely? Bet against.
|
||
|
||
3] Such trojans will not show up in The Hack Report. Lee Jackson
|
||
does not cover this angle, for obvious reasons.
|
||
|
||
4] It puts you on the Republican side in the war on porn. You
|
||
can be smug, like them, in knowing that YOU ARE DOING THE
|
||
RIGHT THING when stomping on those presumed vile by the Moral
|
||
Majority. Heck, you might even strike a few Republicans
|
||
anonymously in this manner.
|
||
|
||
5] Think of the kid who's gonna have to explain to his Dad
|
||
why the PC in the study room just went down. You could be steering
|
||
the boy in the right direction by discouraging him from tieing up the
|
||
phone and blowing valuable online time downloading more filth.
|
||
|
||
But pd trojans have their place, too. To that end, Crypt Newsletter
|
||
has included the DEBUG script to BATCOMPI.COM, a very effective
|
||
BAT2EXE trojan. BATCOMPI will, indeed, compile your .BAT files
|
||
into flawless .COM's. However, don't make a mistake when editing
|
||
your .BATfile!! BATCOMPI will point out the line number and then
|
||
punish the drive with a heavy stick. Also included are the
|
||
convincing, BUT COMPLETELY BOGUS, docs for BATCOMPI, written by
|
||
"Ned Turnquist." Be sure to include these with BATCOMPI, wherever
|
||
it goes, to further give it that right patina of legitimacy. (Like
|
||
XTRATANK, BATCOMPI strikes at the greed of users who wish a
|
||
"free lunch.")
|
||
|
||
And also for your trojan programmer's toolkit, a DEBUG script of
|
||
NOWHERE MAN's CRYPTCOM utility. CRYPTCOM serves many purposes.
|
||
Use it to put an encryption shell over your trojan, in the
|
||
event that someone might look at it with CHK4BOMB. Use it to
|
||
put an encryption shell on an old virus that you'd like to
|
||
get past an initial run by an up-to-date scanner.
|
||
|
||
[Also in this issue, a DEBUG scipt of the CASINO virus. The
|
||
CASINO virus is a very fine program, but, unfortunately, it scans.
|
||
If you want to get CASINO past the original round of scanning on
|
||
any machine, CRYPTCOM it.]
|
||
|
||
CRYPTCOM is merely part of Nowhere Man's Nowhere Utilities 2.0
|
||
software package. If you find it helpful, you'll want to dash
|
||
out and obtain the complete package at places like The Hell Pit
|
||
or the BBS's listed at the end of The Crypt Newsletter.
|
||
|
||
[For assembly, take the DEBUG script for the appropriate trojan,
|
||
virus, or utility listed in the newsletter appendices and
|
||
go to the C:\> prompt.
|
||
|
||
Type, DEBUG <*.scr, where the wildcard is the name of the appropriate
|
||
script. Then <enter>. If DEBUG is in your path,
|
||
the CASINO virus, BATCOMPI, CRYPTCOM, or NUKEX should now be assembled
|
||
and sitting in the current directory, ready for use.
|
||
|
||
NUKEX? "What's that, URNST?" I hear you screech. NUKEX is a bonus
|
||
trojan! Invoking NUKEX will immediately abolish the directory
|
||
structure on the C: drive of any machine and along with it,
|
||
all the files on the disk. NUKEX is heavily cushioned for error
|
||
and will gracefully exit to DOS if something unforseen occurs.
|
||
(However, this is unlikely.) NUKEX is completely silent, too.
|
||
Recommended uses: as a stand-alone rabbit-punching program or
|
||
for inclusion as a 'dropped' payload, deposited by virus or
|
||
trojan. NUKEX can be deployed as a subroutine in any
|
||
virus, too. [NUKEX can easily be configured to erase any drive, but
|
||
the copy included with the Crypt Newsletter is good ONLY for
|
||
the C: drive.] I have passed along the source code to Nowhere Man
|
||
who is reviewing it for inclusion in the VCL 2.0.
|
||
NUKEX does not format or overwrite the affected drive. It does
|
||
however, present the user with the unpalatable job of "unerasing"
|
||
hundreds, if not thousands, of files and directory entries.
|
||
|
||
NUKEX user note: if invoked from a floppy disk, NUKEX will
|
||
abolish the directory structure on a fixed disk, leaving itself
|
||
intact. If invoked from anywhere on the fixed drive, NUKEX will
|
||
erase itself in the process of deleting the entire disk. So make
|
||
sure you have a backup.]
|
||
|
||
These programs and utilities should prove helpful if you are
|
||
considering going into the 'trojanizing' business. Remember:
|
||
The right tools for the right job!!
|
||
|
||
***********************************************
|
||
THE FIRST CRYPT NEWSLETTER NATHAN HALE AWARD!!!
|
||
***********************************************
|
||
|
||
Goes to Hans Von Braun, chief sysop for the COMSEC BBS in San Francisco.
|
||
|
||
Our hats off to Von Braun, a member of the National Computer Security
|
||
Association who seems to firmly believe that bulletins like 40HEX
|
||
magazine should be made freely available to any interested party.
|
||
|
||
Since 40HEX describes in detail tricks of virus development, Von Braun
|
||
writes in a recent issue of the NCSA NEWS (a reprint of which was passed
|
||
along to us here at Crypt's editorial bungalow), "We [have been] told
|
||
that there are only a handful of people in the world that should have
|
||
this information; they are antivirus program developers."
|
||
|
||
Von Braun writes earlier, "I believe it is better for
|
||
you to HAVE the information than not to have the information."
|
||
|
||
Now, please go back to the statement "there are only a handful of
|
||
people in the world that should have this information." Whew!
|
||
That's a grand claim! It almost makes virus code sound more
|
||
dangerous than nuclear secrets. Of course, you, the Crypt reader
|
||
know this to be patent bullshit. And, apparently, in some manner
|
||
so does Mr. Von Braun.
|
||
|
||
There are two reasons which come to mind when explaining the a-v
|
||
developers' dumbo rationale for the "eat-your-peas, we know what's best,
|
||
no virus code for you" rule. They are:
|
||
|
||
1]. They really DO believe, in some Luddite way, that letting
|
||
people onto this stuff instigates virus propagation. They DO
|
||
believe that the average lumpen prole is too irresponsible to
|
||
handle code correctly. This is very Republican and corporate,
|
||
and although extremely deluded, easy to grasp. It is soothing
|
||
balm to many clients' ears.
|
||
|
||
2]. And the real kicker: This info
|
||
falls into the realm of "proprietary" secrets. Giving away
|
||
proprietary information increases your competition,
|
||
hurts your market advantage, and is, in general, bad for the
|
||
pocket book because it will spawn users who don't require you
|
||
to hold their pecker for them when they encounter a virus.
|
||
|
||
So, kudos to Mr. Hans Van Braun for his "interesting" stand.
|
||
We include his mailing address here so that you might send
|
||
your opinion to him on this matter:
|
||
|
||
123 Townsend Street
|
||
Suite 555
|
||
San Francisco, CA 94107
|
||
|
||
****************************************************************
|
||
AND THE CRYPT NEWSLETTER's US NEWS & WORLD REPORT IRAQI COMPUTER
|
||
VIRUS PRIZE FOR THIS MONTH . . .
|
||
****************************************************************
|
||
|
||
Goes to Michael Callahan (alias Dr. FileFinder), editor of SHAREWARE
|
||
MAGAZINE. Even after a two issue series interviewing John McAfee,
|
||
Callahan still believes that viruses can permanently damage the
|
||
hard disk. (Talk about dense.) Now you can argue with me on this one,
|
||
but show me a user who claims his machine was irrevocably damaged
|
||
by a virus and I'll show you a user too embarrassed to admit
|
||
he "Pepsi syndrome'd" himself.
|
||
|
||
And Patricia Hoffman's virus library IS NOT the national computer
|
||
virus library, Mike. It may be a big library, but it's not the
|
||
government's, it's not open to private citizens (like national
|
||
libraries) and it is not similar to the American Type Culture
|
||
Collection (ATCC) which is the U.S. clearinghouse for real-live
|
||
microbes of the natural kind.
|
||
|
||
********************************************
|
||
AND THE CRYPT NEWSLETTER VIRUS OF THE MONTH:
|
||
********************************************
|
||
|
||
The CASINO virus - from the island of Malta.
|
||
|
||
The CASINO virus is a memory resident .COM infector. It will
|
||
infect COMMAND.COM and will infect .COM files on the internal
|
||
DIR function, DIR function called by any other program and
|
||
when clean files are opened for any reason.
|
||
|
||
When CASINO is resident, infected files will show only very small
|
||
increases in file size, although the virus is not true "stealth."
|
||
|
||
The interesting trait of CASINO is its activation: On any January 15,
|
||
April 15, and Aug. 15, CASINO will display the following message:
|
||
|
||
"DISK DESTROYER * A SOUVENIR OF MALTA
|
||
I have just destroyed the FAT on YOUR DISK!
|
||
However, I have a copy in RAM and I'm giving you one last
|
||
chance to restore your precious data!
|
||
WARNING: IF YOU RESET NOW ALL YOUR DATA WILL BE LOST - FOREVER!
|
||
Your data depends on a game of JACKPOT.
|
||
|
||
CASINO DE MALTE JACKPOT"
|
||
|
||
CASINO will then compel the user to play a game of chance. If he
|
||
loses, the FAT is destroyed.
|
||
|
||
When I described this to Mrs. URNST KOUCH, she said, "That's evil."
|
||
|
||
A DEBUG script of the CASINO virus is included with this issue of
|
||
the Crypt Newsletter. Enjoy your copy of CASINO virus.
|
||
|
||
PALLBEARER's KONSUMER KORNER: THE TERM PROGRAM FOR VIRUS COLLECTION
|
||
|
||
/********** FACILITATION OF VIRUS COLLECTION I: THE TERM PROGRAM *************/
|
||
|
||
The entire focus of this small article is intended
|
||
to save you and your SysOp time and money in the virus trade. This, num-
|
||
ber one in the series, is designed to help you find the best terminal
|
||
program for your needs. It reflects solely my opinion, but I am
|
||
sure you will find it valuable.
|
||
In the spirit of 'Consumer Reports' and Ralph Nader, I have parked
|
||
myself in front of the computer during much of my spare time to compile
|
||
this report (I know, REAL hard work...). So, without further adieu:
|
||
|
||
-*-
|
||
|
||
PALLBEARER'S GUIDE TO "TERM"
|
||
|
||
|
||
|
||
(Yeah, I know it's a stupid name, but hey, I'm the author, I'm
|
||
allowed to do stupid things.)
|
||
|
||
-*-
|
||
|
||
First, my old standby: Procomm Plus 2.01
|
||
|
||
Well, I have been using a version of Procomm Plus since I started
|
||
collecting virii, and BBSing, for that matter. Many people find
|
||
ProComm to be clumsy. I, personally, enjoy it. Overall, it has two major
|
||
flaws: One - it only supports 3 external protocols; two - it does
|
||
not support AVATAR. Beyond this, I find it very versatile. It
|
||
DOES support many internal protocols, including ZMODEM, XMODEM-CRC, 1K,
|
||
and 1K-G; YMODEM and G, plus a host of other "lesser knowns" such as
|
||
SEAlink, WXMODEM, IMODEM, and, of course, KERMIT, which is run as
|
||
an external. I find the internal ZMODEM inadequate, thus I
|
||
retain DSZ as an external protocol, which I have configured for
|
||
MobyTurbo. HS/Link and Super-Zmodem are also easily supported. On the
|
||
plus side, PCPlus provides COMPUSERVE B+, the famous information
|
||
exchange's protocol of choice. And one BIG feature is the pulldown menus
|
||
from which everything can be configured. With PCPLUS, the only time
|
||
one must ever make use of the install program is if you desire an
|
||
easier way to change modem config and COM ports. PCPLUS also
|
||
supports a Keyboard file for easy user remap, and has a wonderful
|
||
internal utility that speeds up the keyboard of an AT or above.
|
||
The whole ball of wax, including colors, is configurable from the
|
||
menus. Of course, the internal split-screen chat is also accessed
|
||
this way.
|
||
The host mode, for you menu fanatics, leaves much to be desired,
|
||
but works nonetheless; those of you desirous of running BBS through
|
||
Procomm Plus Host, however, should remove your collective thumb
|
||
from your ass and get a life.
|
||
Last, the big question with many PC users today: the SPACE. Well,
|
||
Procomm requires over a Meg of space BUT I would allocate 2.5 Megs on
|
||
my drive for it: this includes constant screen captures and little down-
|
||
loads here and there that seem to be forgotten about. For me, space
|
||
is no object, but for many users this problem is one that is
|
||
paramount.
|
||
|
||
-*-
|
||
|
||
Qmodem 5.0
|
||
|
||
Ahh, the term software that sounds like a transfer protocol. After
|
||
testing this package, my only compliment is that it supports plenty
|
||
of external protocols, shrinks out for a DOS shell, supports AVATAR,
|
||
and is frugal on my hard drive. But my REAL advice to those of you who
|
||
have a Qmodem archive? Delete it. This is one of the worst and
|
||
clunkiest terms I have EVER seen. It displays a nice ANSi at startup,
|
||
and has a colorful install program (sort of reminded me of that of
|
||
Windows 3.1), but otherwise bites the big one. I was constantly referring
|
||
to the help screen, since none of the hotkeys from other terms were
|
||
represented (save for the standard PAGEUP/PAGEDOWN file xfers).
|
||
A plus: file transfer data screens are very informative. However,
|
||
this, too, is tainted by a generally hard-to-navigate interface. I will
|
||
admit I did not spend a lot of time with Qmodem, time I still
|
||
regret wasting.
|
||
A final bonus: Qmodem 5.0 features a superior host
|
||
mode with great menus, etc, but only 2 security levels. Well, what do you
|
||
expect from a term program's host, anyway? I repeat myself: If you
|
||
choose a term for its host mode, your thumb smells strangely of shit.
|
||
|
||
-*-
|
||
|
||
COM-AND 2.8
|
||
|
||
I am surprised to admit I was pleased with this SHAREWARE program. It
|
||
incorporated many of the keys of the best of the "off-the-shelf" out
|
||
there. COM-AND also has a hotkey for ASCII download, which will play
|
||
your session back to you later just like a tape recorder. Nice. Or it
|
||
can be speeded up with a simple keystroke to simply scroll across the
|
||
screen. The dialing directory, always an important part of any term,
|
||
was limited in size to 100 entries, but, then again, who keeps 100
|
||
entries in the dialing directory (before you say 'ME!,' look and see
|
||
when the last time you called some of those BBSes was...)? The directory
|
||
gave me a feeling of deja vu, too. It is faintly reminiscent of those
|
||
early releases by DataStorm. The documentation was thorough, and
|
||
an EXCELLENT help screen could be accessed by striking F10.
|
||
One major feature found in COM-AND and in many other "bare-bones"
|
||
terms, is control and configuration almost exclusively
|
||
by script. All of the major configuration files were written
|
||
in plain English, and could be easily modified in the internal editor,
|
||
reached by simple hotkey.
|
||
Another thing that caught my attention, and it should've caught yours
|
||
while reading this report, is that EVERYTHING has a simple hotkey.
|
||
This can be good or bad. The drawback: While you are learn-
|
||
ing the software you must constantly refer to the helpscreen. This will
|
||
cost you time, and time is money (Ma Bell does not come
|
||
cheap). I suggest picking a group of local BBSes and learning COM-AND on
|
||
those while sticking with another, more familiar term, for LD.
|
||
I guarantee, however, as you improve with time, you will notice
|
||
a marked preference for COM-AND while LD calling; you'll be pleased by
|
||
the ease of use and timesaving brought to you by the hotkeys.
|
||
COM-AND also features one more perq: Encryption. All of its user
|
||
script files (logon/logoff, etc) are saved in the .CMD format, which
|
||
as the docs say, prohibit "casual perusal" from people looking for
|
||
passwords, etc. This makes it an excellent candidate for use on a
|
||
multi-user system. All of these are decrypted in memory and may be
|
||
easily edited in the internal editor. Macro and other files are not
|
||
automatically encrypted, but may be garbled manually with a hotkey.
|
||
As for file transfers, COM-AND features all of the major protocols
|
||
(XMODEM, YMODEM, YMODEM-G, CIS-B and B+ enhanced, and, of course, ZMODEM),
|
||
but it leaves much to be desired in the fact that it does not
|
||
(or so it seems) support external protocols. (COM-AND supports external
|
||
additions through an "accessories" menu. It works well but is
|
||
not particularly user-friendly. -Ed.) Now, this is easy enough to
|
||
fix, write yourself batch files and drop to DOS for your file
|
||
transfers. For those few who find this too difficult (or time consuming
|
||
for bad typists), then either live with the internals, or COM-AND is
|
||
not for you. COM-AND also features an internal Kermit server.
|
||
Overall, I prefer Procomm Plus, thank you very much,
|
||
because of the fact that COM-AND implements externals poorly. Other-
|
||
wise, COM-AND is flawless; a wonder in its configurability.
|
||
Even the nag screen doesn't bother me, all it wants you to do is hit
|
||
a key, and I have to do that with Procomm after it initializes the modem.
|
||
I do consider COM-AND good enough to register!
|
||
It can be picked up from your local pd BBS.
|
||
|
||
-*-
|
||
|
||
Telemate 3.01
|
||
|
||
Last but not least is another shareware answer to term,
|
||
in the spirit of Apogee's Trilogies comes Telemate 3.01, which, like
|
||
Qmodem 4.5 (I tested the registered version, 5.0) and COM-AND,
|
||
is shareware. Also, along the Apogee lines, Telemate is a superior
|
||
term program. It supports multiple externals, multiple common and
|
||
uncommon protocols, and many different emulations including my
|
||
'must have', AVATAR.
|
||
Telemate has one queer feature - it plays music to you.
|
||
That's right! I sat down for the first time with Telemate (incidentally,
|
||
I did not receive the data files for the built-in tutorial, so this
|
||
critique is limited), and did a file transfer, the point of this
|
||
report. When it was completed, I knew my computer meant business
|
||
because it began to play the theme from 'Jeopardy' when I
|
||
didn't press a key fast enough for Telemate's liking. Later, I
|
||
discovered this song could be changed during installation. Speaking of
|
||
which, my biggest complaint with Telemate: all of the major
|
||
settings had to be changed from the config program, which was not
|
||
available on the fly. Also, the Pulldown bar is always exposed
|
||
and includes a status bar at the bottom, giving the user only 23 lines.
|
||
(As far as I could tell, it was simplest to leave it this way.)
|
||
One unique plus to Telemate is its split-screen and box effects, as
|
||
though it's being run under Windows. For instance, it is possible
|
||
to view a text file or the redisplay buffer in one window and have
|
||
the term in the main window. It is also possible to edit a text
|
||
or script file in a window with the term in another. I find this a
|
||
BIG plus to anyone using a term program; it will greatly facilitate
|
||
your time online.
|
||
Last, I must comment on the dialing directory. Frankly,
|
||
it stunk. The default colors were horrible, and editing the entries was
|
||
a mess. Also, it requires 3 or 4 keystrokes to dial an entry, rather
|
||
than one stroke needed for most terms. The dialing directory also had
|
||
annoying habit of coming up as soon as Telemate was called. Thus,
|
||
if you simply needed to send a string to your modem, you had to wait until
|
||
after initialization and then exit from the dialing directory - or
|
||
start dialing a BBS in Europe and not even realize it (and the
|
||
author of Telemate refuses to pay phone bills incurred in this manner...
|
||
sheesh, what a pain...).
|
||
All in all, I found Telemate to be an acceptable term program and would
|
||
switch in a second, if the dialing directory were improved. Well,
|
||
there's always next release, for tomorrow is another day (fiddle-dee-dee).
|
||
|
||
-*-
|
||
|
||
{COMMO} 5.3
|
||
|
||
|
||
For all the manly men in the virus collecting community, Fred
|
||
Brucker's assembly-coded term program could be for you. COMMO's
|
||
strong points are its raw, unsurpassed speed of operation, extremely
|
||
small kernel when shelling to DOS and powerful master macro utility
|
||
which controls all functions in simple, intuitive one-stroke
|
||
hotkeys. Alt-D - dial! PageUP - upload! Alt-X: BE GONE! COMMO
|
||
also takes up almost NO space on a hard drive. Hey, even a
|
||
steroid-gobbling idiot can use COMMO!
|
||
COMMO's disadvantage (and it's one that weenies will be leary of):
|
||
It supports only Xmodem and Ymodem internally. The good news: Zmodem,
|
||
HS/Link and Compuserve B+ are ready for your use. Just drop the
|
||
programs into the COMMO directory and they are, almost magically,
|
||
ready for work WITH NO USER CONFIGURATION REQUIRED.
|
||
As shareware, COMMO is quite reasonably priced: $25 cash money.
|
||
Shelling out a little more gains a host of COMMO-ready scripts which
|
||
activate a mini-host and a number of other somewhat useless utilities.
|
||
|
||
/*
|
||
* Well, I do hope you enjoyed this small romp through this vail of tears,
|
||
* er, terms. Be on the lookout for next issue's guide to transfer
|
||
* protocols: and remember, it's good stuff, because I'm not only a
|
||
* CryPt SysOp, I'm also a member. Acknowledgements to authors and
|
||
* ordering info for each reviewed program is found below.
|
||
*
|
||
* -Pallbearer [CryPt]
|
||
*
|
||
*/
|
||
|
||
|
||
PROCOMM PLUS 2.01: Copyright (c)1987, 1991, Datastorm Technologies.
|
||
|
||
QMODEM 5.0: Copyright (c)1992, Mustang Software
|
||
|
||
COM-AND 2.8: Copyright (c)1991 CABER software (R. Scott McGinnis).
|
||
Available through PLINK, GEnie, UNISON, NWI, Delphi,
|
||
and CompuServe.
|
||
|
||
TELEMATE 3.01: Copyright (c)1988 - 1992, White River Software.
|
||
CompuServe in IBMCOM forum Library 3/Comm program.
|
||
FidoNet requestable from 1:2202/1 as 'telemate'.
|
||
|
||
{COMMO} 5.3: Copyright (c)1989, 1992; Fred P. Brucker
|
||
On CSERVE, go IBMCOM, Library 3/Comm programs.
|
||
|
||
-Hey, you find this boring, but what if you ever
|
||
WANT to get a copy of one of these?
|
||
****************************************************************************
|
||
|
||
ADDITIONAL USER NOTES ON PROGRAMS INCLUDED WITH THIS ISSUE OF
|
||
THE CRYPT NEWSLETTER - A SERVICE TO THE TERMINALLY STUPID BECAUSE
|
||
WE CARE
|
||
|
||
The CORRUPTO script will produce CORRUPTO.COM. In 'heuristic' mode,
|
||
F-PROT 2.05 flags CORRUPTO as containing routines which search for
|
||
.COM and .EXE files, possibly indicative of a virus. This is
|
||
true and gives you a good excuse to run CRYPTCOM on CORRUPTO after
|
||
manufacture and see how it cleans this problem up. In addition,
|
||
you might want to consider touching up the size (CORRUPTO is less
|
||
than 1k, hardly convincing as a simple V-loader.) and date/time stamps
|
||
on the trojan. For those tasks, you'll need the rest of Nowhere Man's
|
||
Nowhere Utilities 2.0. I'm sure you'll want to get them and see how
|
||
easy they make these mundane chores for yourself.
|
||
|
||
[On F-PROT 2.05: Fans of this program, and I am one, are probably
|
||
somewhat bemused by its increasingly skitzy performance, which
|
||
Skulason duly notes in F-PROT's expanding 'bug reports.' 2.05 is
|
||
incrediby slow and sometimes hangs when analyzing files
|
||
heuristically, destroying much of this feature's utility for the
|
||
average user. And occasionally 2.05 does not appear to scan memory
|
||
at all on my machine. Geezus.]
|
||
|
||
You can also "tickle the dragon's tail" with CORRUPTO. Place it in
|
||
a directory by itself and execute it. CORRUPTO will install a drive bomb
|
||
on itself in a trice, display an error message, beep once and return
|
||
you gracefully to the DOS prompt. This is just as things will appear
|
||
to the pigeon. DO NOT RUN CORRUPTO AGAIN!! (Unless you want to replace
|
||
the partition on your fixed disk, anyway.) Delete the file and prepare
|
||
your original copy of CORRUPTO (you did make a backup, didn't you?)
|
||
for its trojan archive.
|
||
|
||
THE NUKEX script will generate NUKEX.COM. NUKEX.COM can be flagged
|
||
by F-PROT 2.04 as 'suspicious' because it contains a recursive
|
||
search mechanism. Don't forget to use CRYPTCOM if you want to
|
||
avoid all possibility of this.
|
||
|
||
For further info on the Nowhere Utiltities CRYPTCOM, see the
|
||
accompanying appendix, CRYPTCOM.DOC. Meanwhile, see this
|
||
final ad:
|
||
*****************************************************************************
|
||
The Nowhere Utilities v2.0 are finally out! v2.0 includes several bug
|
||
fixes and improvements, in addition to three new utilities:
|
||
|
||
o DECRYPT: Decrypts data encrypted with most 8- and 16-bit
|
||
encryption schemes, usually in under 10 seconds!
|
||
|
||
o FAKEWARE: In just a few minutes, FAKEWARE will generate
|
||
a totally bogus ware, right down to the ZIP comment and
|
||
.NFO file by a famous cracking group. Great for distributing
|
||
new virii and trojans.
|
||
|
||
o USER2TXT: Converts a Telegard v2.5/v2.7 or X-Ot-Icks v3.8
|
||
user list to a readable ASCII file. Useful for on-line
|
||
reference while hacking...
|
||
|
||
Get the Nowhere Utilities today! A fine set of programs to help the
|
||
corrupted programmer develop and spread his creations. Useful to just
|
||
about anyone at one time or another. From the author of Virus Creation
|
||
Laboratory.
|
||
|
||
[NuKE] Release [NuKE] Release [NuKE] Release [NuKE] Release [NuKE] Release
|
||
*****************************************************************************
|
||
|
||
|
||
-*-
|
||
|
||
Closing quote for the day:
|
||
|
||
"Remember, boys and girls, to put your roller skates away
|
||
at the TOP of the stairs."
|
||
--Soupy Sales
|
||
|
||
|
||
-*-
|
||
|
||
This issue of the Crypt Newsletter SHOULD contain the following
|
||
files:
|
||
|
||
CRYPTLET.TR5 - this document
|
||
PENIS.ASM - MASM/TASM compatible source listing for the PENIS
|
||
trojan
|
||
CORRUPTO.SCR - DEBUG script for the CORRUPTO 2 trojan
|
||
NUKEX.SCR - DEBUG script for the bonus trojan/util, NUKEX
|
||
CRYPTCOM.SCR - DEBUG script for Nowhere Man's CRYPTCOM
|
||
trojan/virus toolkit utility, Nuke
|
||
International Software, Inc.
|
||
CRYPTCOM.DOC - documentation and user notes for CRYPTCOM
|
||
CASINO.SCR - DEBUG script for the CASINO virus
|
||
BATCOMPI.SCR - DEBUG script for BAT2EXE trojan program
|
||
BATCOMPI.DOC - 'fake' documentation for BATCOMPI trojan program
|
||
ASM.BAT - ancillary file to accompany BATCOMPI.DOC
|
||
|
||
If any of these files are missing, demand upgrade!
|
||
|
||
As usual, current and complete issues of the Crypt Newsletter can
|
||
be obtained at the DARK COFFIN BBS. Here at the newsletter, we welcome
|
||
your comments and contributions, so, until next time . . .
|
||
|
||
I remain your obedient servant,
|
||
|
||
URNST KOUCH
|
||
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͻ
|
||
<20> This V/T info phile brought to you by <20>瘞, <20>
|
||
<20> Makers/Distributors/Info Specialists in Phine Viruses/Trojans. <20>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
||
<20> Dark Coffin <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> HQ/Main Support <20><><EFBFBD> 215.966.3576 <20>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ķ
|
||
<20> VIRUS_MAN <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Member Support <20><><EFBFBD><EFBFBD> ITS.PRI.VATE <20>
|
||
<20> Callahan's Crosstime Saloon <20><><EFBFBD><EFBFBD> Southwest HQ <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> 314.939.4113 <20>
|
||
<20> Nuclear Winter <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> Member Board <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> 215.882.9122 <20>
|
||
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ͼ
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|