Torrent Hash - Hash of all existing torrents
Please, pay attention to the fact that you are about to download the torrent NOT from torhash.net
torhash.net is just a torrent search engine, no torrents are hosted here.
torhash.net is just a torrent search engine, no torrents are hosted here.
the giant black book of viruses
Infohash:
7558CB34CA7D1CBC3C699A4FAE118E5F643CDD54
Type:
Books
Title:
the giant black book of viruses
Category:
Other/E-books
Uploaded:
2008-11-03 (by myriadmagus)
Description:
Table of Contents
* Introduction
o Defense Against Viruses
o Military Applications
o Computational Exploration
* Computer Virus Basics
o The Structure of a Virus
o Virus Classification
o What You'll Need to Use this Book
o Organization of this Book
* PART I
o The Simplest COM Infector
+ COM Program Operation
+ Overwriting Viruses
+ The Search Mechanism
+ The Replication Mechanism
+ Discussion
+ Exercises
o Companion Viruses
+ Executing the Host
+ File Searching
+ File Infection
+ Variations on a Theme
+ The SPAWNR Virus Listing
+ Exercises
o Parasitic COM Infectors: Part I
+ The Justin Virus
+ Checking Memory
+ Going into the High Segment
+ The File Search Mechanism
+ Examining the Host
+ Infecting the Host
+ Executing the Host
+ The Justin Virus Source
+ Exercises
o Parasitic COM Infectors: Part II
+ The Timid-II Virus
+ Data and Memory Management
+ The File Search Routine
+ Checking the File
+ The Copy Mechanism
+ Executing the Host
+ The Timid-II Virus Listing
+ Exercises
o A Memory Resident Virus
+ Techniques for Going Resident
+ The Sequin Virus
+ Hooking Interrupts
+ The Pitfalls of Sequin
+ The Sequin Source
+ Exercises
o Infecting EXE Files
+ The Structure of an EXE File
+ Infecting an EXE File
+ The File Search Mechanism
+ Passing Control to the Host
+ The INTRUDER-B Source
+ Exercises
o Advanced Memory Residence Techniques
+ Low Level Memory Residence
+ Returning Control to the Host
+ FCB-Based File Operations
+ Finding Infectable Files
+ Infecting Programs
+ Self-Detection in Memory
+ Windows Compatibility
+ Testing the Virus
+ The Yellow Worm Source Listing
+ Exercises
o An Introduction to Boot Sector Viruses
+ Boot Sectors
+ The Necessary Components of a Boot Sector
+ Interrupt 13H
+ The BASIC.ASM Boot Sector
+ The BOOT.ASM Source
+ A Trivial Boot Sector Virus
+ A Better Boot Sector Virus
+ The Infection Process
+ PC-DOS and DR-DOS Compatibility
+ Testing Kilroy-B
+ Kilroy-B Source Listing
+ Exercises
o The Most Successful Boot Sector Virus
+ The Disk Infection Process
+ Memory Residence
+ Infecting Hard Disks
+ Infecting Floppy Disks
+ The Logic Bomb
+ The Stoned Listing
+ Exercises
o Advanced Boot Sector Techniques
+ Basic Functional Characteristics
+ The BBS on the Hard Disk
+ The BBS on Floppy Disk
+ Self-Detection
+ Compatibility
+ The Loader
+ The BBS Source
+ The FATMAN Listing
+ The BOOT.ASM Source
+ Exercises
o Multi-Partite Viruses
+ Military Police
+ The MP as a Boot Sector Virus
+ The MP Turns TSR
+ Infecting Files
+ Loading from a File
+ The Military Police Source
+ Exercises
o Infecting Device Drivers
+ Step One: The File Structure
+ Step Two: System Facilities
+ Step Three: The Infection Strategy
+ Step Four: Implementation
+ Assembling a Device Driver
+ The DEVIRUS Source
+ Exercises
o Windows Viruses
+ Windows EXE Structure
+ The Windows EXE New Header
# Segment Table (Defines segments in the program)
# Resident Name Table (A list of resident names and references)
# Non-Resident Name Table
# Entry Table (Table of entry points for the program)
# Module Reference Table
# Imported Name Table (Names of modules imported by the program)
# The Resource Table (Vital information about the EXEs resources)
# Resource Type Record Definition
# Name Info Record Definition
+ Infecting a File
+ Using the Windows API
+ Protected Mode Considerations
+ Memory Management and DPMI
+ Getting Up and Running
+ Implementation as a Windows EXE
+ Infecting DLLs
+ General Comments
+ The Caro Magnum Source
+ Exercises
o An OS/2 Virus
+ OS/2 Memory Models
+ OS/2 Programming Tools
+ The Structure of an Executable File
+ Function Calls
+ Memory Management
+ A New Hoop to Jump Through
+ And One We Get to Jump Through
+ The Source Code
+ Exercises
o Unix Viruses
+ A Basic Virus
+ The X21 Step by Step
+ Hiding the Infection
+ Unix Anti-Virus Measures
+ The X21 Source
+ The X23 Source
+ Exercises
o Source Code Viruses
+ The Concept
+ The Origin of Source Code Viruses
+ A Source Code Virus in C
+ Source Listing for SCV1.C
+ Source Listing for VIRUS.H
+ Source Listing for CONSTANT.C
+ Test Drive
+ The Compressed Virus
+ Source Listing for SCV2.C
+ Source Listing for VIRUS2.HS
+ A Source Code Virus in Turbo Pascal
+ Source Listing of SCVIRUS.PAS
+ Source Listing of ENCODE.PAS
+ Exercises
o Many New Techniques
+ Exercises
* Part II: Anti-Anti Virus Techniques
o How A Virus Detector Works
+ Virus Scanning
+ Behavior Checkers
+ Integrity Checkers
+ Overview
+ The GBSCAN Program
+ The GBCHECK Program
+ The GBINTEG Program
+ Exercises
o Stealth for Boot Sector Viruses
+ The Anti-Virus Fights Back
+ Viruses Fight Back
+ Anti-Viruses Fight Back More
+ Further Options for Viruses
+ Memory "Stealth"
+ Level One Stealth Source
+ Level Two Stealth Source
+ Exercises
o Stealth Techniques for File Infectors
+ Self-Identification
+ The Interrupt 21H Hook
+ File Search Functions
+ File Date and Time Function
+ File Size Function
+ Handle-Based Read Function 3FH
+ FCB-Based Read Functions
+ Move File Pointer Function 42H
+ EXEC Function 4BH
+ An Interrupt 13H Hook
+ The Infection Process
+ Anti-Virus Measures
+ Viruses Fight Back
+ The Slips Source
+ Exercises
o Protected Mode Stealth
+ Protected Mode Capabilities
+ I/O Port-Level Stealth
+ Interrupt Hooking
+ Memory stealthing
+ Interrupt Tunnelling
+ Protected Mode Programming
+ The Isnt Virus
+ Hooking Interrupt 21H
+ Stealthing the Body of the Virus
+ The Interrupt 0FFH Hook
+ Protected Mode and Advanced Operating Systems
+ The Isnt Source
+ Exercises
o Polymorphic Viruses
+ The Idea
+ Encryption Technology
+ Self-Detection
+ Decryptor Coding
+ The Random Code Generator
+ Modifying the Decryptor
+ The Random Number Generator
+ Results with Real Anti-Virus Software
+ Memory-Based Polymorphism
+ The Many Hoops Source
+ The Visible Mutation Engine Source
+ Testing the Many Hoops
+ Exercises
o Retaliating Viruses
+ Retaliating Against Behavior Checkers
+ Silence
+ Logic Bombs
+ Dis-Installation
+ An Example
+ Integrity Checkers
+ Security Holes
+ Logic Bombs
+ Viral Infection Integrity Checking
+ Defense Against Retaliating Viruses
+ The Retaliator II Source
+ The SECREAD.PAS Program
+ Exercises
o Advanced Anti-Virus Techniques
+ Spectral Analysis
+ Heuristic Analysis
+ The FINDVME Source
+ The FREQ Source
+ Exercises
o Genetic Viruses
+ Genetic Decision Making
+ Genetic Mutation
+ Darwinian Evolution
+ Real-World Evolution
+ Fighting the Evolutionary Virus
+ The Next Generation
+ The GENE.ASM Source
+ Exercises
o Who Will Win?
+ A Corollary to the Halting Problem
+ The Problem
+ The Future of Computing
+ So Who Will Win?
* Part III. Payloads for Viruses
o Destructive Code
+ Trigger Mechanisms
+ The Counter Trigger
+ Keystroke Counter
+ Time Trigger
+ Replication Trigger
+ The System-Parameter Trigger
+ Date
+ Time
+ Disk Free Space
+ Country
+ Video Mode
+ BIOS ROM Version
+ Keyboard Status
+ Anti-Virus Search
+ Processor Check
+ Null Trigger
+ Logic Bombs
+ Brute Force Attack
+ Start Making Noise
+ Fool With The Video Display
+ Disk Attacks
+ Damaging Hardware
+ Disk Failure
+ CMOS Battery failure
+ Monitor Failure
+ Keyboard failure
+ Stealth Attack
+ Indirect Attack
+ Example
+ The Pascal Unit
+ Virus Bomb
+ Encrypting the Virus
+ Summary
o A Viral Unix Security Breach
+ The Password File in BSD Unix
+ Enter the Virus
+ A Typical Scenario
+ Modifying master.passwd
+ Access Rights
+ The Snoopy Source
+ Exercises
o Operating System Holes and Covert Channels
+ Operating System Basics
+ Compromising the System
+ Microsoft Idiosyncrasies
+ Why a Virus is Needed
+ The KBWIN95 Virus
+ More Covert Channels
+ The Capture Software Source
+ The KBWIN95 Virus Source
+ Demonstrating the KBWIN95
+ Exercises
o A Good Virus
+ Why a Virus?
+ 1. Virus Technology
+ 2. Self-Reproduction
+ Dishonest Employees
+ The File Buffer System
+ The Physical Disk
+ Operation of the KOH Virus
+ Infecting Disks
+ Encryption
+ The Interrupt Hooks
+ Ctrl-Alt-K: Change Pass Phrase
+ Ctrl-Alt-O: Floppy Disk Migration Toggle
+ Ctrl-Alt-H: Uninstall
+ Compatibility Questions
+ Legal Warning
+ The KOH Source
+ Exercises
* Appendix A: ISR Reference
o Interrupt 10H: BIOS Video Services
o Interrupt 13H: BIOS Disk Services
o Interrupt 1AH: BIOS Time of Day Services
o Interrupt 20H: DOS Terminate
o Interrupt 21H: DOS Services
o Interrupt 24H: Critical Error Handler
o Interrupt 27H: DOS Terminate and Stay Resident
o Interrupt 2FH: Multiplex Interrupt
o Interrupt 31H: DPMI Utilities
o Interrupt 40H: Floppy Disk Interrupt
* Appendix B: Resources
o Inside the PC
o Assembly Language Programming
o Viruses, etc.
Files count:
3
Size:
5.73 Mb
Trackers:
udp://tracker.openbittorrent.com:80
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969
udp://open.demonii.com:1337
udp://tracker.coppersurfer.tk:6969
udp://exodus.desync.com:6969