These are the days when a hunt to shame someone secretly, or you decide to create a virus that will steal data, any data. Imagine yourself as evil hackers who decide to take action. Let us know this immense art.
Virus definition
The history of computer viruses dates back to 1983, when Fred Cohen first used it.
A virus is a malicious code; it is aimed at seizing control of your files and settings. Creates copies of himself, in every possible way litter the user's personal computer. Some can be detected immediately when others hide in the system and parasitize in it. Often their transfer takes place using sites hosting pirated content, porn sites and others. It happens that downloading viruses occurs if you want to download a mod or cheat. It’s quite simple to spread the virus if you have a viral link ready.
Malware Exposure Methods
Computer viruses include many malicious programs, but not all of them are capable of "reproduction":
- Worms They infect files on the computer, it can be any files, ranging from .exe and ending with boot sectors. Transmitted via chats, programs for communication such as Skype, icq, via e-mail.
- Trojan horses, or trojans. Deprived of the independent ability to spread: they get to the victim’s computer thanks to their authors and third parties.
- Rootkit The assembly of various software utilities when it penetrates the victim’s computer receives superuser rights, we are talking about UNIX systems. It is a multifunctional tool for "sweeping tracks" during an invasion of the system using sniffers, scanners, keyloggers, trojan applications. Able to infect a device on the Microsoft Windows operating system. Captures call tables and their functions, methods for using drivers.
- Extortionists. Such malware prevents a user from entering the device by forcing a ransom. The latest major ransomware related events are WannaCry, Petya, Cerber, Cryptoblocker, and Locky. All of them demanded Bitcoin for returning access to the cryptocurrency system.

- Keylogger. Monitors the entry of logins and passwords on the keyboard. It captures all clicks, and then sends the action log to the remote server, after which the attacker uses this data at his discretion.
- Sniffers. It analyzes data from a network card, writes logs using listening, connecting a sniffer when a channel is broken, a sniffer branches off a copy of traffic, as well as through analysis of spurious electromagnetic emissions, attacks at the channel or network level.
- Botnet, or zombie networks. Such a network is a multitude of computers that form one network and are infected with malware to gain access to a hacker or other attacker.
- Exploits This type of malware can be useful for pirates, because exploits are caused by errors in the software development process. This is how an attacker gains access to the program, and then to the user's system, if the hacker intended. They have a separate classification according to vulnerabilities: zero day, DoS, spoofing or XXS.
Distribution paths
Malicious content can reach your device in many ways:
- Viral link.
- Access to the server or local network through which the malicious application will be distributed.
- Running a virus infected program.
- Work with applications of the Microsoft Office package when using viruses of documents the virus spreads throughout the user's personal computer.
- View attachments that came with e-mail messages, and they ended up with infected programs and documents.
- Starting the operating system from an infected system disk.
- Installing a pre-infected operating system on a computer.
Where viruses can hide
When a virus link is made, and you have launched a program that starts hidden work on a personal computer, some viruses and other malicious programs are capable of hiding their data in the system or in executable files, the extension of which can be of the following type:
- .com, .exe - you downloaded some program, and there was a virus;
- .bat - batch files containing certain algorithms for the operating system;
- .vbs - program files in the language of Visual Basic for Application;
- .scr - screensaver program files that steal data from the device screen;
- .sys - driver files;
- .dll, .lib, .obj - library files;
- .doc - Microsoft Word document;
- .xls - Microsoft Excel document;
- .mdb - Microsoft Access document;
- .ppt - Power Point document;
- .dot - application template for Microsoft Office packages.
Signs
Any disease or infection proceeds in a latent phase or in an open, this principle is also inherent in malicious software:
- The device began to malfunction, programs that worked well before suddenly started to slow down or crash.
- Slow device operation.
- The problem with starting the operating system.
- Disappear files or directories or change their contents.
- The contents of the file are subject to change.
- Change file modification time. You may notice if the list view is used in the folder, or you look at the property of an element.
- Increase or decrease the number of files on disk, and subsequently increase or decrease the amount of available memory.
- RAM becomes smaller due to the work of extraneous services and programs.
- Display shocking or other images on the screen without user intervention.
- Strange beeps.
Security methods
It's time to think about ways to protect against intrusion:
- Software methods. These include antiviruses, firewalls, and other security software.
- Hardware methods. Protection against tampering to the ports or files of the device, directly when accessing the hardware.
- Organizational methods of protection. These are additional measures for employees and other persons who may have access to the system.
How to find a list of viral links? Thanks to the Internet, you can download services, for example, from Dr.Web. Or use a special service to display all possible harmful links. There is a list of viral links. It remains to choose the most suitable option.
Viral link
Do not forget that the use of virus programs is punishable by law!
We proceed to the most important action - to create viral links and find out how to distribute them.
- Choose an operating system to attack. More often it is Microsoft Windows, since it is more common than other systems, especially if it comes to older versions. In addition, many users do not update operating systems, leaving them vulnerable to attacks.
- Choose a distribution method. How to create a viral link that will not be distributed? No way. To do this, you can pack it into an executable file, a macro in Microsoft Office, a web script.
- Find out the weak spot for an attack. Tip: if the user downloads pirated software, he usually turns off the antivirus or does not pay attention to it due to the presence of a tablet in the repack, so this is another way to penetrate.
- We determine the functionality of your virus. You can simply check the antivirus for the ability to detect your virus, or use a malicious program for larger purposes such as deleting files, viewing messages and other actions.
- In order to write something, you have to choose a language. You can use any language, or even several, but the C and C ++ language is used to a greater extent; there are Microsoft Office for macro viruses. You can figure it out with lessons on the Internet. Visual Basic is a development environment.
- Time to create. This can take a lot of time. Do not forget about ways to hide the virus from antivirus programs, otherwise your program will be quickly found and neutralized. Not the fact that you hurt someone badly, so sleep peacefully. However, remember that for any malicious software you must be responsible! Learn more about polymorphic code.
- Check out the code hiding methods.
- Check the virus for operability in the virtual machine.
- Download it to the network and wait for the first "customers".
A virus link for a phone is created in much the same way, but iOS devices will have to suffer, as there is a good protection system, unlike Android. However, in recent versions, many holes in the protection system have been fixed. Do not forget that there are still old devices, and knowing the "love" for creating new versions from third-party developers, most Android devices are at risk.