Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
CRYPTOCURRENCIES
The Ultimate Guide To Creating Viruses - Create, Crypt 'n' Go [Tutorial]
Message
<blockquote data-quote="Greenhost" data-source="post: 665" data-attributes="member: 20"><p>Now for crypting</p><p>To Crypt, you need CryptMe. CryptMe's purpose is to make your virus undetectable by all antiviruses...Limitless Logger and Predator Pain have their own crypter, though it definitely does not do the job. CryptMe is ESSENTIAL to bypass AV's</p><p>Now when you start CryptMe you have 5 options down below/in the menu. The only two you need is Icon and Crypt. Scanning, Binding and Status are all tools not required and not needed for this guide. Binding files is something I'll took about after this short bit about how to crypt your file PROPERLY.</p><p></p><p></p><p>So to start off, your going to need an icon. Think about the file you are building, so if you built something like a Minecraft Code Generator then get an icon from google images, convert it to .ico and then place it in there. an icon should be 256x256!</p><p></p><p></p><p>Once you have set the icon, go to Crypt. The ONLY options you should have enabled is Startup, Delay Runtime (helps bypass certain crypters), EOF Support, and Mutex. These are all essential to keeping your file undetectable and harder to remove.</p><p></p><p></p><p>Once you have crypted your file, duplicate it, or make a new copy and scan the new copy on virustotal.com...DO NOT scan the copy you are going to upload/spread on virustotal, it'll completely ***** it up.</p><p>So make sure it's 0/46 or 1/46...one virus is fine as you can just tell your victim its a false positive and right some technical crap down and they'll most likely believe you.</p><p></p><p></p><p>Once it's done, use mediafire, zippyshare or multiupload to upload your file and for users to download it. Sending it directly through IM's is definitely not the best idea.</p><p></p><p></p><p>Once it's uploaded and ready to spread, we will now go and find some victims!!</p><p></p><p></p><p>[Image: 9WdF3lx.png]</p><p></p><p></p><p>Chapter 3: Spreading - Distributing your Virus!</p><p>You've made your file, you've made it undetectable and you've uploaded it and is ready to spread, now it's time to find some victims!</p><p></p><p></p><p>Before anything, your going to want to setup a mini sales pitch to make your file seem legitimate. You can't just run around saying 'Download my file' you have to make it sounds at least like it's not a keylogger that's about to steal all of your info!!</p><p></p><p></p><p>For arguments sake, we'll make this file a MineCraft Code Generator.</p><p></p><p></p><p>Sales pitch for something like a forum, or online community:</p><p>"Hey guys, I'm selling a MineCraft Code Generator that allows you to generate FREE Minecraft codes! I am giving it away to the first 3 posters & a moderator then it costs $5 to the public (unless I decide to give it to more people)...</p><p>How does it work?</p><p>It pulls un-used minecraft codes from the MC purchase database and allows you to use them yourself...it is a great tool for you minecraft players!"</p><p></p><p></p><p>Something like that will get the job done. Below is a list of ways to spread your virus:</p><p></p><p></p><p>*I am going to say this and warn you, don't even bother trying to get HF members. Majority of us will know what your up to and just report you to an admin. We are here to hack, we'll be able to tell if your a con or not!*</p><p></p><p></p><p>#1: Skype</p><p>If you have a skype with loads of contacts, Post around some crap like "need testers for my script" or "giving away *your file* for free only to the first replier*...you'll lure plenty of idiots doing this. The more believable, the more people you will lure in. It also depends on where you got these contacts from.</p><p>If you are not comfortable using your real skype (in case you are scared of your IP being found out) use a SOCKS5 Setup which makes your skype unresolvable by skype IP resolvers...there is a guide on how to do this that allows you to here:</p><p></p><p></p><p>#2: Forums or Online Community's</p><p>These are another great way to spread your virus. If you apply yourself to writing a nice, convincing pitch along with maybe a few photoshops of your file to make it more believable, you'll be able to lure in a lot of people into downloading your virus!</p><p></p><p></p><p>#3: Chat Rooms</p><p>Believe it or not, sites like this are actually one of the most effective and anonymus ways to infect potential victims. Simply binding your file into a .png or .jpeg will allow you to ewhore and keylog at the same time. eWhore gone wrong? No worries, decide to send your 'nude' photo to your omegle buddy and boom, there's a keylog right there!</p><p></p><p></p><p>#4: Contact Forms</p><p>I've used this method, and surprisingly, you would not believe how many clueless site admins fall for this. I contacted 3 or 4 owners of blogs and websites asking if they would be willing to try out my new plugin for wordpress or PHP that allows them to add sliders and other cool features to their site with my virus...it is a slow and unpredictable process, though it works. 3 out of the 4 contacted downloaded the file and never responded. The file was confirmed downloaded via the log records with their admin usernames/pw's.</p><p></p><p></p><p></p><p></p><p>[Image: 9WdF3lx.png]</p><p></p><p></p><p>Chapter 4: Analyzing Your Logs!!</p><p>Most people rely on stealers to do most of the work, and do not focus on keystroke loggers. KeyStroke loggers are your ONLY HOPE once a person realises they're account details are being stolen...How? Well, if you followed the steps correctly and your keylogger still exists (unless they format their computer, then your *****) then you're most likely still receiving logs. If this is the case, only keystroke logs are going to be recorded. But before I read more into that, Let me teach you how to analyze your logs PROPERLY, to get the most out of your efforts.</p><p></p><p></p><p>Firstly, NEVER EVER delete your logs. I don't care if your inbox has 1,000 logs in it, that means you ain't reading enough. Read EVERY single one of your logs as one day you may hit the jackpot with a keystroke logger with a bitcoin account login with 1,000BTC in it. And your low-grammar ass deleted it. Well, don't. Read your keystroke loggers and read through them hard as they are your only source of password changes and missed logins by the stealers.</p><p></p><p></p><p>Secondly, Read through your keystrokes twice. Why? It's simple. Passwords are changed almost all of the time, especially those who put up a fight to download your file in the first place. The only way to find passwords again once they are changed are with Keystroke logs. Yes, there maybe be 1,000 logs to read through, though sure as hell it's worth it once their sorry ass has to ***** your dick for their accounts back.</p><p></p><p></p><p>So, analyze your logs, and analyze them good. A lot of the important scraps come out of that comparing to stealer logs, even though they may be full of A's, S', D's and W's from that game they were playing for a good hour and a half!</p></blockquote><p></p>
[QUOTE="Greenhost, post: 665, member: 20"] Now for crypting To Crypt, you need CryptMe. CryptMe's purpose is to make your virus undetectable by all antiviruses...Limitless Logger and Predator Pain have their own crypter, though it definitely does not do the job. CryptMe is ESSENTIAL to bypass AV's Now when you start CryptMe you have 5 options down below/in the menu. The only two you need is Icon and Crypt. Scanning, Binding and Status are all tools not required and not needed for this guide. Binding files is something I'll took about after this short bit about how to crypt your file PROPERLY. So to start off, your going to need an icon. Think about the file you are building, so if you built something like a Minecraft Code Generator then get an icon from google images, convert it to .ico and then place it in there. an icon should be 256x256! Once you have set the icon, go to Crypt. The ONLY options you should have enabled is Startup, Delay Runtime (helps bypass certain crypters), EOF Support, and Mutex. These are all essential to keeping your file undetectable and harder to remove. Once you have crypted your file, duplicate it, or make a new copy and scan the new copy on virustotal.com...DO NOT scan the copy you are going to upload/spread on virustotal, it'll completely ***** it up. So make sure it's 0/46 or 1/46...one virus is fine as you can just tell your victim its a false positive and right some technical crap down and they'll most likely believe you. Once it's done, use mediafire, zippyshare or multiupload to upload your file and for users to download it. Sending it directly through IM's is definitely not the best idea. Once it's uploaded and ready to spread, we will now go and find some victims!! [Image: 9WdF3lx.png] Chapter 3: Spreading - Distributing your Virus! You've made your file, you've made it undetectable and you've uploaded it and is ready to spread, now it's time to find some victims! Before anything, your going to want to setup a mini sales pitch to make your file seem legitimate. You can't just run around saying 'Download my file' you have to make it sounds at least like it's not a keylogger that's about to steal all of your info!! For arguments sake, we'll make this file a MineCraft Code Generator. Sales pitch for something like a forum, or online community: "Hey guys, I'm selling a MineCraft Code Generator that allows you to generate FREE Minecraft codes! I am giving it away to the first 3 posters & a moderator then it costs $5 to the public (unless I decide to give it to more people)... How does it work? It pulls un-used minecraft codes from the MC purchase database and allows you to use them yourself...it is a great tool for you minecraft players!" Something like that will get the job done. Below is a list of ways to spread your virus: *I am going to say this and warn you, don't even bother trying to get HF members. Majority of us will know what your up to and just report you to an admin. We are here to hack, we'll be able to tell if your a con or not!* #1: Skype If you have a skype with loads of contacts, Post around some crap like "need testers for my script" or "giving away *your file* for free only to the first replier*...you'll lure plenty of idiots doing this. The more believable, the more people you will lure in. It also depends on where you got these contacts from. If you are not comfortable using your real skype (in case you are scared of your IP being found out) use a SOCKS5 Setup which makes your skype unresolvable by skype IP resolvers...there is a guide on how to do this that allows you to here: #2: Forums or Online Community's These are another great way to spread your virus. If you apply yourself to writing a nice, convincing pitch along with maybe a few photoshops of your file to make it more believable, you'll be able to lure in a lot of people into downloading your virus! #3: Chat Rooms Believe it or not, sites like this are actually one of the most effective and anonymus ways to infect potential victims. Simply binding your file into a .png or .jpeg will allow you to ewhore and keylog at the same time. eWhore gone wrong? No worries, decide to send your 'nude' photo to your omegle buddy and boom, there's a keylog right there! #4: Contact Forms I've used this method, and surprisingly, you would not believe how many clueless site admins fall for this. I contacted 3 or 4 owners of blogs and websites asking if they would be willing to try out my new plugin for wordpress or PHP that allows them to add sliders and other cool features to their site with my virus...it is a slow and unpredictable process, though it works. 3 out of the 4 contacted downloaded the file and never responded. The file was confirmed downloaded via the log records with their admin usernames/pw's. [Image: 9WdF3lx.png] Chapter 4: Analyzing Your Logs!! Most people rely on stealers to do most of the work, and do not focus on keystroke loggers. KeyStroke loggers are your ONLY HOPE once a person realises they're account details are being stolen...How? Well, if you followed the steps correctly and your keylogger still exists (unless they format their computer, then your *****) then you're most likely still receiving logs. If this is the case, only keystroke logs are going to be recorded. But before I read more into that, Let me teach you how to analyze your logs PROPERLY, to get the most out of your efforts. Firstly, NEVER EVER delete your logs. I don't care if your inbox has 1,000 logs in it, that means you ain't reading enough. Read EVERY single one of your logs as one day you may hit the jackpot with a keystroke logger with a bitcoin account login with 1,000BTC in it. And your low-grammar ass deleted it. Well, don't. Read your keystroke loggers and read through them hard as they are your only source of password changes and missed logins by the stealers. Secondly, Read through your keystrokes twice. Why? It's simple. Passwords are changed almost all of the time, especially those who put up a fight to download your file in the first place. The only way to find passwords again once they are changed are with Keystroke logs. Yes, there maybe be 1,000 logs to read through, though sure as hell it's worth it once their sorry ass has to ***** your dick for their accounts back. So, analyze your logs, and analyze them good. A lot of the important scraps come out of that comparing to stealer logs, even though they may be full of A's, S', D's and W's from that game they were playing for a good hour and a half! [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
CRYPTOCURRENCIES
The Ultimate Guide To Creating Viruses - Create, Crypt 'n' Go [Tutorial]
Top