ads

all about virus


"A program that can infect other programs by modifying them to include a slighty altered copy of itself. A virus can spread throughout a computer system or network using the authorization of every user using it to infect Reviews their programs. Every programs that gets infected can also act as a viral infection that grows :: Fred Cohen "

introduction 
----------------- 

Are You never heard what it was a virus, do you know what the virus is, here I will try to interpret what the virus. virus better known in medical terms as a virus or meaning of "biological virusses" also proved popular in the world of these electrons. these things happen because of the similarity in the distribution mechanism. 

Computer viruses can be interpreted clearly is an ordinary computer program. but have fundamental differences with other programs, which he made ​​to infect other programs, convert, manipulate even damage it. 

but there needs to be noted here, the virus will infect only when the trigger program or programs that have been infected earlier executed, where it differs from the "worm". I'm not going to try to discuss the worm because it will divert us from the discussion of this virus.

origin of virus 

1949, John Von Neuman, expressed "self-altering automata theory" which is the result of research mathematicians. 

1960, lab BELL (AT & T), the experts in the lab BELL (AT & T) to dabble theory expressed by John V Neuman, they play around with the theory for a type of game / games. The experts have made ​​a program that can reproduce itself and can destroy the opponent artificial programs. The program is able to survive and destroy all the other programs, it will be considered the winner. This game eventually became a favorite game each and every lab computer. the longer they were aware and cautious start this game because the program created more and more dangerous, so they do surveillance and tight security. 

1980, the program is eventually known as "virus" was successfully spread beyond the lab environment, and began circulating in cyberspace. 

1980, the virus began spreading viruses known in the cyber world. 

Types of Viruses 
----------------- 

To further refine our knowledge about the virus, I will try to give an explanation of the types of viruses that often roam the cyber world. 

1. Macro Virus 
   
I think we all have very often heard about this virus. The virus is written in the programming language of an application rather than the programming language of an Operating System. The virus can be run if the constituent applications can run well, that is if the computer can run applications mac word then this virus works on Mac computer operating system. 

examples of viruses: 
  • W97M-variant, eg W97M.Panther 1234 bytes long, it will infect and infect the Normal.dot document when opened. 
  • WM.Twno.A; TW :: 41 984 bytes, will infect Ms.Word document that uses a macro language, usually with extension *.DOT and *.DOC
  • etc 

This paper therefore I do not type in the word (:p) 

2. Boot Sector Virus 

Boot sector viruses are common once spread (frankly often formatted my hard drive because of a virus because of this: P, but because he was I am friends with him, :)). This virus will reproduce itself in a move or replace the original boot sector to boot virus program. So when there is a boot virus will be loaded into memory and then the virus will have the ability to control the standard hardware (ex :: monitor, printer, etc.) and from this memory is also the virus will spread throughout the existing drive and connected to computer (ex: floppy, drive other than c:\) 

virus samples :: 
  • Wyx virus variants (I am subscription :) ex: wyx.C (B) infect the boot record and floppy; length: 520 bytes; characteristics: memory resident and encrypted) 
  • Variant of the V-sign: infect: Master boot record; length of 520 bytes; characteristics: living in the memory (memory resident), encrypted and polymorphic) 
  • Stoned.june 4th / bloody !: infect: Master boot record and floppy; length of 520 bytes; characteristics: living in the memory (memory resident), encrypted and displays the message "Bloody june 4th 1989" account after booting the computer 128 times) 

3. Stealth Virus 
 
This virus will master DOS interrupt table table that we often refer to as "Interrupt interceptor". This virus capable to control instruction DOS level instructions and usually they are hidden as well as a full name or size. 
   
examples of viruses: 
  • Yankee.XPEH.4928, Infect files *.COM and *.EXE; length of 4298 bytes; characteristics: resident in memory, the size of the hidden, has a trigger 
  • WXYC (Which includes boot record category was due to enter the stealth category also included here), infects the master boot record and floppy; 520 bytes long; settled in the memory; size and hidden viruses. 
  • Vmem (S): infects files *.EXE, *.SYS, and *.COM; file length of 3275 bytes; characteristics: resident in memory, the size of the hidden, encrypted. 
  • etc 
4. Polymorphic Virus 

The virus is designed to fool antivirus programs, meaning the virus is always trying to avoid being recognized by antivirus fox by always changing the structure after each infected file/other programs. 

examples of viruses: 
  • Necropolis A/B, infects file *.EXE and *.COM; file length 1963 bytes; characteristics: resident in memory, and the size of a virus hidden, encrypted and can change its structure 
  • Nightfall, Infects files *.EXE; file long 4554 bytes, characteristics: resident in memory, and the size of a hidden virus, has a trigger, encrypted, and can change its structure 
  • etc
5. Virus File/Program 
 
This virus infects files that can be executed directly from the operating system, be it an application file (*.EXE), and (*.COM) usually results from infection with this virus can be identified by changing the file size is attacked. 

6. Multi Partition Virus 
 
This virus is a combination of boot sector viruses and file viruses: means work performed resulted in two, that he can infect files *.EXE and also infect the boot sector.

criteria Virus 
-------------- 

A virus, it can be said is completely true virus when at least have 5 criteria ( the criteria I get from a reliable source :)) 
  1. ability of a virus to obtain information 
  2. ability to check a program 
  3. ability to replicate and infect 
  4. ability to manipulate 
  5. ability to hide itself. 
Now I will try to briefly explain what is meant by each of the capabilities and why it is needed. 

Now I will try to briefly explain what is meant by each of the capabilities and why it is needed. 

The ability to obtain information 

In general, a virus requires a list of the names of the files in a directory, for what? so that he can recognize what programs would he infect, such as macro viruses that will infect all files ending in (* doc) after the virus was found, where the ability to gather the necessary information so that the virus can create a list/data of all files, then sort by searching for files that can be infected. This data is usually created when a program is infected or infected with the virus program or even executed. The virus will be to collect the data and put in RAM (usually: P), so that when the computer is turned off all the lost data but will create every program run normally made ​​hidden infected by a virus (so not plasticity). 

Examine the ability of a program

A virus should also be able to check a program to be infected, for example, he served infect extension program (*.doc), he should check whether the document file has been infected or not, because if it is then he will be useless infecting 2 times. It is very useful to improve the ability of a virus to infect a speed in terms of file/program.Yang virus is commonly performed by a mark on the file / program which has infected so easy to be recognized by the virus. Examples of marking is for example provide a unique byte in every file that has been infected.

Ability to replicate itself 

the core of the virus is the ability to duplicate itself by infecting other programs. A virus has found a potential victim (either a file or a program) then it will recognize the look, if not infected then the virus will begin to infect the action by writing byte identifier in the program / ​​file, and so on to write virus code above object files / infected program. Some common ways are done by the virus to infect / reproduce itself are: 
  1. File/program to be infected deleted or renamed. then created a file using the name by using the virus (the virus changed his name with the name of the deleted file) 
  2. Virus program already in execution/load memory to be directly infect other files by means riding all files/programs that exist. 
The ability to double the manipulation 

Routine (routine) owned by a virus will be executed after the virus infects a file / program. contents of this routine can range from mild to destruction. This routine is commonly used to manipulate programs and popularizing the author! (: P) This routine utilizes the ability of an operating system (Operating System), so it has the same ability to that of the operating system. 

eg:
  1. Creating an image or message on the monitor 
  2. Replace / change the change the label of each file, directory, or the label of the drive in pc 
  3. Manipulating programs / files are infected 
  4. Undermine the program / ​​file 
  5. Disrupting the work printer, etc. 
The ability to hide themselves

Hiding away this ability to be possessed by a virus that all the good work from the beginning to the success of transmission can be accomplished. usual steps are: 
  • The original program code is stored in the form of machines and combined with other programs that are considered useful by the user. 
  • Program Boot Record virus or placed on a track that is rarely noticed by the computer itself 
  • The virus program is made as short as possible, and the results do not change infected file     size 
  • The virus does not change the description of the time a file 
  • etc 


Here's How Hackers Steal Nude Photos of Jennifer Lawrence


Internet universe yesterday shocked by the spread of nude photos of hundreds Hollywood celebrities, including Jennifer Lawrence, Selena Gomez, Ariana Grande, Rihanna and Kate Upton. Strong suspicion that the photo spread by hackers who managed to break into the victim's iCloud account. 


The assumption is becoming stronger after in the afternoon, appeared iBrute tool that uses a Python script on GitHub site. iBrute can be used to steal user passwords Apple iCloud. The script exploit security holes in anti-theft feature Find My iPhone.

Attacks by a method called the Brute-Force iPhone users to guess a password repeatedly to find the correct password. The attacker can do since Find My iPhone does not restrict the error to enter a password, also did not remind any suspicious activity to the one underway when the user tries to access his personal account.


When an attacker successfully find the desired password, they can access freely iCloud because most iPhone users synchronize cell phone with the service. When connected to iCloud, iPad, iPhone or your Mac will automatically synchronize, photos, videos, contact number and e-mail addresses to iCloud. 

The Next Web reported that a Twitter user successfully using the tool of the GitHub users to access multiple iCloud accounts, but the gap was finally closed Apple on Monday (1/9) yesterday.

Today, when we enter the wrong password five times, Apple will disable our Apple ID automatically. To The Next Web, the creator of these tools, Haackapp, claimed to have seen evidence that the Brute-Force method used to hack into accounts of Hollywood celebrities, but it could be someone already using it.


Interestingly, Hackapp also explain another drawback of iCloud are very open to hackers exploited. Against this problem, Apple explained that they are still investigating.


"We take user privacy seriously and we are actively investigating these reports," said Apple spokesperson Natalie Kerris

Linux History [part 1]



The Birth of "UNIX" 
 
Forerunner to the birth of Linux began in the late 1960s at a company AT & T (American Telephone and Telegraph). At that time, AT & T in collaboration with MIT (Massachusetts Institute of Technology) works by using operating system called "Multics". Multics had a lot of problems, the biggest problem is the high cost incurred to run on the mainframe General Electric (GE 645). Subsequent developments were to be unsatisfactory.

However the use of Multics retained because it offers the ability multi user (shared use). The programmers have to work together and exchange information easily, and they are eager to be able to escape from the huge cost problems. Along with the development and improved financial, the group is trying to find a suitable replacement for Multics.

Ken Thompson, one of the group members AT & T, began designing a game called "Space travel", unfortunately this game also cost you a fortune to be played. When Thompson found a digital computer the PDP-7, along with fellow student Dennis Ritchie, they rewrote the game in assembler and move it by using paper tape. In the development of the game move they have put "command interpreter" and some basic commands to copy and move files

Beginning in 1970, Brian Kerningham, a developer other than AT & T proposed the name "Unix" as a pun on Minix (equipment to teach programming). Began a forerunner to an operating system called "Unix". Unix development team is asking for the PDP-11 computer to the management of AT & T, the more powerful machine than the PDP-7, but it is cheaper than all costs to be paid in advance.

the introduction of LAN network[part 1]



Understanding and Working Principle LAN 

LAN can be defined as a network or a network of computer systems, which are located in one building is limited, a complex building or a campus and not using the common media of communication facilities such as telephone, but the owner and manager of media communications is the owner of LAN itself. From the definition above we can know that a LAN is limited by physical location. As for the use of LAN itself lead to all computers connected in a network can exchange data or otherwise related. Cooperation is growing from only the exchange of data through the use of equipment together. LAN are generally using a hub, will follow the working principle of the hub itself. In this case is that the hub does not have knowledge of the destination address so that the delivery of broadcast data, and also because the hub has only one collision domain so that if one port is busy, the other ports will have to wait.

Basic Components of LAN 
=================== 
Some of the basic components of a LAN are usually formed as follows: 
  • Workstation 

Workstation is a node or host in the form of a computer system. The computer system can be either a PC or can be in the form of a large computer systems such as minicomputers, even a mainframe. Workstations can work alone (stand-alone) can also use the network to exchange data with other workstations or users. 
  • Server 

Hardware (hardware) that functions to serve the network and workstations connected to the network. general resources (resources) such as printers, disks, and so on to be used jointly by the users at workstations reside and work on the server. Based on the type of service known disk server, file server, print server, and a server can also have multiple functions at the same service.
  • Link(association) 

Workstations and servers can not function when the equipment is not physically connected. These relationships are known as the LAN transmission medium which is generally in the form of cable. As for some examples of the link is: 
1. Twisted Pair Cable 
  • The cable is divided into two, namely Shielded Twisted Pair and Unshielded Twisted Pair(UTP) 
  • More widely known as a telephone cable 
  • Relatively inexpensive 
  • Short distance 
  • Easily influenced by disturbances 
  • Data rate that can be supported is limited, 10-16 Mbps 

2. Coaxial Cable 
  • Commonly used on television 
  • Relatively more 
  • Data transmission speeds higher than the Twisted Pair, 30 Mbps 
  • Prices are relatively inexpensive 
  • The size is larger than Twisted Pair 

3 Fiber Optic Cable 
  • The long distance 
  • High data speed, 100 Mbps 
  • The size of the relatively small 
  • Difficult influenced disorders 
  • The price is still relatively expensive 
  • Installation is relatively difficult 

  • Network Interface Card(NIC)

A workstation is not connected directly to the cable or transceiver cable networks, but through an electronic circuit that is designed specifically to handle network protocol known as the Network Interface Card(NIC).

  • Network Software

Without the software network then the network will not work as desired. This software also allows one computer system to communicate with other computer systems. 

LAN Support Tools 
============== 
a. Repeater 
  • In OSI, working at the Physical layer 
  • Continue and strengthen the signal 
  • Widely used in bus topology 
  • Its use is easy and relatively cheap price 
  • Not to have knowledge of the destination address so that the delivery of broadcast data 
  • Only have one collision domain so that if one port is busy, the other ports will have to wait. 

b. Hub 
  • Work on the Physical layer 
  • Forwarding signal 
  • Not to have knowledge of the destination address 
  • Its use is relatively easy and affordable prices 
  • Only have one collision domain 

c. Bridge 
  • Working in the Data Link layer 
  • Have used the addresses to forward the data to its destination 
  • Automatically create a table translator for each port received 

d. Switch 
  • Working in the Data Link layer 
  • Each port in the switch has its own collision domain 
  • Have a central translation table that has a list of interpreters for all ports 
  • Allows the transmission in full Duplex (two-way) 

e. Router 
  • Router or filter function to filter the data traffic 
  • Determine and select the alternate path to be traversed by the data 
  • Connecting the LAN inter-networking, even with the WAN

LAN topology 
========== 
Understanding Network topology is the arrangement of the data flow path in the network that physically connects one node to another node. The following are some of the existing network topology and used to date, namely: 
  • Star topology 

Some node / nodes connected by the central node / host, which form a physical network such as stars, all communications are handled directly and managed by a mainframe host computer.



  • Hierarchical Topology 

Shaped like a branching tree that consists of a host computer(host) connected to the node/other nodes in stages. Higher level serves as a regulator of the underlying employment levels.



  • Bus Topology 

Some node/nodes connected by data path(bus). Each node can perform the tasks and operations that are different but all have the same hierarchy.



  • Loop Topology 

Is the relationship between the node/nodes serially in the form of a closed circle. In this form there is no central node/host, all have the same hierarchy.



  • Topology Ring 

This shape is a combination of form and bus loop topology, if one node/node is damaged, it will not affect other communication nodes as separate from the data path.


  • Topology Web 

Is a form of topology, each node/nodes in the network can be interconnected with other nodes through some links. A web form network with n nodes, will use as many links as n (n-1)/2.



By using all the advantages and disadvantages of each configuration, allows the development of a new configuration that incorporates several new technologies that accompanied topology ideal conditions of a network system can be fulfilled.

[WANT TO BE A HACKER]



To be a hacker, which is needed first of all is the desire. Because the question is not 'Will I become a hacker?', But 'Do I want to become a Hacker?'. If you have the desire, then you have to have a capital base as your foundation you in step. 

Everything must start from a dream, and certainly if you have a dream, you will try to make it happen. In essence, before stepping make sure that you have had the desire. 

[*] Learn the programming language. 

The first thing you should learn is the programming language. Currently in the distribution of the Linux operating system, there are a variety of useful tools that will support you to learn to program. 

To get Linux is now very easy, you can buy it online or get a copy of his CD's from a friend. Or if you have good internet access, you can directly download linux distributions its official website, or through www.linuxiso.com. 

According to Eric S. Raymond, a good programming language to learn for the first time is the 'Python'. 

"The design of its clean, well documented and easy enough for a beginner" 
 [ERIC S. RAYMOND] 

[PYTHON] 

$ python 
Python 2.1.1 (# 2, Sep 26, 2001, 09:32:53) 
[GCC 2.95.3-5 (cygwin special)] on cygwin 
Type "copyright", "credits" or "license" for more information. 
>>> 

>>> Print "Hello world \n" 
hello world 

>>> 

[PYTHON EOF] 

After python, you can proceed with the 'JAVA'. Java is very popular, because 'bytecode' compilation results are 'Machine Independent' that does not depend on the machine or the type of processor, but it depends on 'its Runtime Environment'. But behind his lead, 'greedy' memory is one of the weaknesses of Java. 

In the end, if you want a serious towards programming, inevitably you will be dealing with the C language used to write the Unix and Linux operating systems (as well as other operating systems). 

Assembly language is also important. Where if you master the assembly you will begin to feel the 'soul of a machine'. You will learn to program something from the ground, each part of the program, so that you will understand the 'How It Works!' 

Books or courses alone will not be enough to make you a reliable programmer. Reprogrammed to be done such as using everyday language. All you have to do is read the code and write code. 

Try to read the code (open source software) others. Learn the mindset and its problem-solving techniques. And try to find a better way. 

[*] Learn and develop one of the Unix OpenSource. 

Why Linux / Unix OpenSource so important? It all can not be separated from the spirit of OpenSource itself. By studying the codes released free in OpenSource operating system, we can study the mindset of a programmer / hacker, we can find their way in handling the problem and trying to find a method of solving problems better than what they do. OpenSource also helps us in building an application, so we do not need to be bothered with the 'research'. They have done it for us, and we can use the time left for something more specific.

"I could be far-sighted, because I am standing on the shoulders of geniuses past .." 
[Sir Isaac Newton]

[*] Learn new things. 

Many new things arise, and every thing (whatever) will give us a lesson for life and life is HACKING. Avoid to be skeptical and open-minded to start. New things all the more so radical, many of the most skeptical people, but an open mind will give you a good groove in the knowledge gain. 

Science is everywhere. Even in a considered dirty. For example, you try to compare 'dirt' cattle (herbivores) with 'dirt' cats (carnivores). We can see that the cow dung 'over mounting "of the cat feces, and not in spite of it, in general we can draw the conclusion, that the herbivores (plant eaters) than carnivores (meat eaters). The cause is most relevant to this case is a factor of 'food'. Plants consumed by herbivores (cows in this example) contains 'cellulose' or more difficult to digest fiber, so more leave residual substances. This is not true carnivores (in this example the cat). The meat is more easily digested, so just leave a little residual substances. 

With a little imagination dirty, just imagine the things dirtier to be analyzed and taken lessons. 

Within the scope of a computer, learn all new things. You can find a lot of new things through the article, journal, or the news 'nerd' in 'slashdot'. 

[*] Always use logic. 

Think with logic is needed in Hacking. In Hacking you will be dealing with a variety of circumstances to be analyzed and solved logically. 

Logic will help you to revive the lost rationality and thinking helps you to live and stay alive. 

[*] Follow the development of technology and information. 

Information technology is developing very fast. A programming language that we learn today can be quickly replaced with a new programming language or visuals that are easier to read and easier, rather than a fool. All that changed with the passage of time and when we realized we left far behind. 

A good idea to always read, or at least get a 'digest' of the sciences/latest info. You can also get information from mailing lists and newsgroups. 

With the always up-to-date, you will always be close to the information. 

[*] Know the things that have not been known. 

In anything in this world, we must reflect. Dispose of all prejudices and values​​. Discard the unilateral assumption that 'I am a wizard'. Sit down for a moment and began to think. 

What do I know? 
What do not I know? 
Would I know? 

If yes ... 

What should I do? 

Of course learning! 

Why is this so difficult? 

Because you do not have a firm grip! 

What should I do? 

Know what you know not !!!! 

To be able to understand the computer you will find something that is interconnected. To understand the first thing you have to understand a few other things. 

To be able to understand how the NMAP (Os fingger Print, which utilizes sequence TCP/IP stack as an identifier) you must first understand the concept of the C programming language, you also have to understand the 'pointer', and the concept of pointers is closely related to 'stack', you should also have a good understanding of the stack! 

You also will be busy with studying the concept of TCP/IP. You also need to know first 'where can i get info about the TCP/IP'. In this way, pull the conclusion to get to know and understand everything and to find answers to things we do not know! 

[*] Keep Learning. 

The most important of all the above is always learning. Without learning you will not gain anything. Never assume if it 'has' become a hacker you would stop learning, on the contrary you will begin to learn again to be a dedicated hacker. 

Continue to learn, and remember when you stop for a moment and think back ... you have become a formidable Hacker !. 


[*] Serve the hacker culture 

Once everything is finished and you are resting after activity Hacking exhausting 37 hours. Try to remember back. 

Who introduced you to the computer? 
Who is guiding you learn it? 
Who accompany you faithfully pursue information? 

Who was the first one to introduce you to HACKING? 
Teach you the techniques of Basic Hacking? 
Teach you about behaving and thinking like a HACKER? 

Who makes Hackers operating system, Linux? 
Who developed it? 
Who made it so easy to operate with 
look so pretty? 

Who has made you EXIST in this world? 

Make them Happy ..... 
If you think the best way to please them is to pay them the money, you are absolutely wrong. If you do is say thousands of thanks to them, also WRONG. 

Just do what they have done. If you find it with this document, create a new document, create a better and share it with others! 

By doing the little things the best you can do, then you have devoted to the hacker culture. 

And when the morning came, and the sun emit light. ALREADY TIME TO GET OUT, ​​AND KNOWN THE WORLD.

Thanks to 
H3D87 a.k.a MOBY
eCHo staff: Y3DIPS, THE_DAY2000, COMEX
Thank you to my good friends (who never I know who)

[CYBER COMMUNITY]


As with real life, cyber society also form communities based on the mood and the idea of ​​equality. Some are based on the area/region. Hacker community is growing in tune with other cyber community. As a community, the community consists Hacker 'elders' along with its members. Hacker community, usually do not have a leader and the leader is not so appreciated. They believe all forms of 'mastery' is not good. But from that point on, the community elders Hackers know, 'chiefs', or someone who elevated level but is not considered a leader. 

Basically, do not either have a ruler(if the leader is defined so). And Hacker do not believe the authorities, in which individuals become ruler over himself. 

In the community, it is impossible to live without rules, also without a leader, Hacker also realized it. For that 'elders' or 'chieftain', 'elite', or 'Demigod'. They lifted up and be heard (for progress together), but unlike the real world leaders, respected elders do not deserve to excess. They are valued because of its reputation, dedication not because he is an elder. 

Hackers gather and communicate electronically via the mailing list or IRC discussions. But the real hacker community often marred by Lamer(term for people who do not have the ability Hacking, too arrogant and prides itself via IRC channels).

Community at the present time is very bad. According to a colleague of the USA that I contacted expressed "Hacking Scene is just a bunch of loosers small penis". Yes, there is truth. If we look at the reality of today's 'The Hacker' is simply a group of school children who are good at using a script, without wanting to know how the script works. Indeed, they are part of a community, but if they do not want to learn, they will not be more powerful than the 'Small Penis loosers'. 

Other than that, there remains a serious group of young people gradually learn and improve their abilities, to become a True Hacker. 

Main stream hacker's world now has much changed, they begin to destroy the infrastructure that has been initiated by his predecessor. And even worse, they were not willing to learn and be smart, so forever be a fool. 

I'm sure you do not want to be like that !!

[Conscience OF THE HACKER]


This is our world now
Its world-electron and the switch
and the beauty of the baud

We understand there is no nationality, skin color, or religious prejudice

You proclaim war, kill, and cheat, and lie to us and ensure that this is for our own good, but still we are called criminals

Yes ... I was a criminal

My crime is that of curiosity

My crime is MORE CLEVER of you, something that you did not expect

I was a HACKER, and this is my MANIFESTO

You can to stop me, but will never be able to stop us all..

[STAGE OF HACKING]



If we go deeper, to know and not just to know, we will see a sub-culture in the world of Hacking. Electronically, Hacker-Hacker throughout the world in touch either through IRC, Messenger and E-mail. And in establishing a good relationship between fellow hackers formed a rules/code of conduct.

[RULE OF HACKER]
  1. Access to a computer or anything that can teach you how the world works should be unlimited. Always raise your middle finger in any form of imperialism and restraint.
  2. All information should be free (free)
  3. Never trust the AUTHORITY.
  4. Hackers and anyone should be rewarded with his hacking abilities, not because of good criteria, such as degrees, age, and position.
  5. We can create beauty with computers.
  6. Computers can make our lives better.
  7. As the lights 'Aladdin', we can make any kind are in the grip.

Every true hacker must always run the code of ethics, although there is no requirement in the run. But in the world on intellectual, violated the code of ethics is a shameful thing. Remember, hackers have a good memory, once you break the code of ethics, then to come back and interact with the community takes a very long time.

The development of a mini computer with a more affordable price makes this electronic community extends.

At that time (the 1980s), is a pleasure to use computers for teens. Most of them only use the computer to play games. But some of them grow into a real hacker through natural selection.

When the modem becomes a necessity, and a BBS (Bulletin Board System) scattered everywhere. It's time to peek out. Virtual world is so vast. And community re-formed.

In a wider range of terminology Hackers 'new' form. They are mostly teenagers, selecting high computer skills, and is always keen to try new things.

One by one the small communities are formed, they are not only related through the BBS (read: Mail Box), but the meetings 'real' started. And to assert their existence, introduced a manifesto or better known as the 'Conscience OF THE HACKER'. The first one was released in an electronic magazine (e-zine) Phreaks-Hack (Phrack), which was written by 'The Mentor'

[HACKER VS CRACKER]



On the other side of the world Hacker. There is also a set of expert computer underground, 'Techno Junkies', or better known as CRACKER. 

Cracker is the dark side of the Hacker. They use traditional their ability to gain access to the computer/data bank and secret data. basically they are smart people, their brilliance in computer science to match even more than Hacker, but unfortunately the science they used to things that are not useful. 

From this we can draw the conclusion that, there is a gap between the Hacker Cracker. Both are relevant but not the same. Both keep electronic activists, but runs on a different path. 

For Hackers, they are usually a bit reluctant to get in touch with Cracker. Crackers should get out of the 'Play Pen'(a box of baby play) and begin to respond to serious computer not just play(read: experiment)

[IDENTIFICATION OF HACKER]


According to Marc Rogers, Hacker can be identified above: 

[1]. Old School Hackers 
The group's oldest and pioneer of mythology Hacker. They are a group of young people 'Techno Nerd' from MIT or Stanford University. They so enjoy programming and systems analysis system without interest to vandalism and theft of data. 

[2]. Script Kiddies or Cyber ​​Punks 
This group usually younger. They were aged 12-30 years and most are still in school. Bored to school, but they have a broad knowledge of technology. They took the scripts/exploits then use it to destroy the system as much as possible that can be done. 

[3]. Professional criminal or CRACKERS 
This group has a very high computer skills, but has a great destruction of nature instinct. They are usually paid by a company for its business knockdown. 

[4]. Coder/Virus Writer 
Natural talent programmer. They are able to do Coding every day, and find weaknesses. They are attracted to an artificial life. Make something that 'lives' in the computer. Try it in a lab computer virus called 'ZOO', then release it in the wild (read: Internet)

[THE HACKER]


Let's start stepping ...

'I am a hacker, enter my world.'

[The Conscience of Hacker, The Mentor]

Hacker dominated by men, and most of the young men. Fair enough I guess, considering every man has a dream and the will to make it happen. Hackers socially, intermediate social status. Medium in the sense that they are quite wealthy and could have a computer and internet access. Indeed, the Internet can not be separated from life hacker. On the internet was the Hackers meet, discuss and joke with each other. 

In psychology and instinctively Hackers have many similarities. Every hacker is basically the anti-authority. Where the arbitrary authority will make all the new thinking and scientific abused. Authorities also makes the system and order of life is so boring. Freedom is beautiful, but remember your freedom is the freedom of others as well. Be prepared to pull away if you start to feel quite selfish. 

In social life Hackers usually do not have a place. Dissolved in social life will make you careless and even lazy. Social life was not disgusting, it's just that mainstream culture is now very hard. When the beat management techniques. Everyone is vying to create a management ideal, without ever thinking whether the system is ideal for applied engineering. 

Social life too much negative impact. Rationality has now faded. Every new theory is applied in the social life is rejected with very skeptic. And most obviously, the more a Hacker plunge into social life (non-scientific) they already do not have time to read, learn, and develop his theory. 

But this should not be judged by so extreme. After all every human being is a social being. It took others 'real'. And it is not unusual if a hacker has a good social life, participating in the social organization of society, has a boyfriend and normal life in the community. It is actually very good! 

Hackers can physically be identified with a penchant reading, eccentric, and have the mindset that even slightly deviates much. 

Fond of reading is the main requirement to become a Hacker. World can be explored through the book. Hackers are usually interested in the discussion-oriented techniques, also science fiction computer manuals (commonly called RTFM, Read The Fuckin 'Manual). 

Reading science fiction indirectly will inspire us some new things. Reading science fiction also gives us enlightenment freedom of thought. Start imagining, dreaming of something, learn and achieve! Believe it or not, but most of the discoveries of this decade is the dream of the previous decades. 

Hackers and 'eccentric' is actually no relationship at all.However with freedom of thought earlier, every Hacker applying a concept of living and a unique lifestyle, which inevitably with 'so' they feel comfortable. 

Hackers life as a teenager can be quite difficult. Teens are still not able to understand the life of a 'geek'. Geek as labeling of Hacker impressed 'glow in the dark'. Both physically and psychologically they are quite different from the 'popular kids' at school. Such as 'Peter Deutsch' (one of the first wave Hacker), 'child' does not have any capability in the field of sports, but the 'master' in mathematics. Teens today are much more appreciative of the physical appearance and ability in the field. Someone should not appreciated because 'beauty', because he is a '.....', but in the world of Hackers someone appreciated what was done and what he was thinking. 

Many hackers are bored with the formalities and social demands. Even among them, trying to break the social demands. 

For example, schools. Young hackers usually hate school. School is often described as the 'Baby Food'. When Hacker growing up and an insatiable curiosity to school, they learn from the world. Learn by observing, which is referred to as visual learning. Schools sometimes almost certainly does not provide an answer to the curiosity of a Hacker. One of the reasons why they hate school. 

The only way to know the world is watching. We must learn from the world. Pay attention to the world, looking for patterns and similarities then we will be able to learn a lot of things. 

For example: 

We learn in the school of law of inertia. Where an object tends to maintain its position to remain stationary or moving through a straight line. Let us connect with life. You must have to try to relax for a while on the day off. The first day you spend to play Play Station (not learned). Day 2 you spend 8 to try the latest games that you downloaded along with his crack (without learning). Likewise, the next day you spend with playing without learning, until after the holidays. And when you start to re-learn, you will get into trouble and sometimes you have to start from scratch (scratch) anymore. When this is the 'inertia' happen to you. Yourself you tend to retain a position to keep playing and without you realizing that you have to be 2 units on the right point of balance (2 points goodness), it is now being 2 units left of the equilibrium point (2 points ugliness). You have shifted the 4 steps backward from the starting position. So to reach a value higher than the initial position before, you have to expend energy by: 

2 (to the point of balance) + 2 (your starting position) + n (the position you want to achieve). 


All things in life are interconnected. Learn !! 


"Learn this universe. Do not feel disappointed if the world does not know you, but was disappointed if you do not know the world"

[Kong Fu Tse]

And I found a world out there..



[H3D87] 

Back in 1959 when this all began. No one can imagine "EAM room" in Building 26, MIT at that time. A new room at MIT, Massacusetts Institute of Technology where a machine that works like a computer fast asleep. 

At that time not many people who can imagine a smart machine, a computer. However, a fortune for some young people who are members of the 'TECH MODEL RAILROAD CLUB', TMRC. When the gates are wide open, and it's time to HACKING and discover how this machine works. 

Hacker is a nickname for a programmer who is able to make an application or a problem-solving algorithm that is better than the one designed together. Broader than that Hacker is a person who can overcome the limitations of the better ways and simple, impressed even unique. 

Hackers have a steady mindset in solving problems about logic and analysis. This is a lot to make Hacker melabelisasi themselves as a 'NERD'. The same principle is carried out as a social leap where the lack of public recognition will 'mental / behavioral' Hacker itself. 

With the passage of time, the meaning of Hacking began to spread even infringe on the true meaning. 

Hacking. Every computer maniac, 'Techno Nerd', 'Hackivist', 'hacker' has its own sense of Hacking. 

[1] H3D87 (Author) 
Hacking is a form of thinking and problem-solving techniques are better than that has been designed with a unique and sometimes impressed. 

For me, Hacking is not just hanging in the context of computers, software hacking, kernel hacking, hardware hacking. But in the context of the world. The world is a beautiful place to Hacking. Pay attention to the world, take a problem and start looking for ways to better cope with. 

'Look, Learn, Master'

[H3D87] 

[2] R. Kresno Aji 
Hacking is an art to understand the operating system and also one of the ways to explore the network security system, so that we can find better ways to secure systems and networks.

(Thanks for the input :), H3D87) 

[3] y3dips (echo staff) 
Hacking is how to provide "nutrition" is more to your brain, how fun to be able to carry out all possible certainty hacking was a spur of the limits of the ability to find satisfaction, find, discover and find. hacking is not a crime but an art to "live" in cyberspace

[4] on your own ... (find) 

Before going any further, it helps you absorb the meaning of Hacking in your life. Every human being has their own way of thinking and understanding, it is time for you to search for the meaning of Hacking, according to your conscience !! 

all about hacking - from outside



* RFC1392, the Internet Users Glossary,: Hacker is: A man who is interested to know in depth about the workings of a system, computers, or computer network. "

Definition:
========
hack
[in general]
  1. Job done quickly and successfully, although not perfect
  2. A thing is impossible, and probably spend a lot of time but produces desired.
  3. For prove either emotionally or physically that this can be done
  4. Doing something in earnest, with high accuracy
  5. Interacting with computers in the play and explore
  6. Short for hackers
hackers
[originally, someone who makes crafts with an ax]
  1. A person who is very happy to explore a program of a system to limit its ability to determine,   using the basic ways that will be used by people who do not understand and know how the program was created and with minimum knowledge of the program.
  2. A person who is very enthusiastic in making a program, and enjoy making the program more than theorize about the program.
  3. A person who is able to do a "hack"
  4. Someone who is very good in programming
  5. Expert programming, or often do work with the program
  6. Experts who are interested in all things, examples of hackers in the field of astronomy.
  7. A person who likes the intellectual challenge with creative ideas
  8. A person who secretly trying to find important information by way of exploring, more commonly referred to as a cracker.
crack
[warez d00dz]
  1. Forced entry into a system
  2. Activity removes copy protection
  3. Program, the instructions used to remove copy protection
Cracker
  1. Someone trying to get into a network by force with the aim of taking advantage, damage, etc..
  2. A person who removes copy protection
  3. A person who carries on "crack"
Cracking
  1. Activity breaking into a computer system with the aim of damaging and destroying took this advantage with certain motives.
Ethical Hacker
===========
  1. The belief that information-sharing is a very good thing and useful, and it is an obligation (code of conduct) for a hacker to share the results of their research in a way to write code that "open- source" and provide facilities to access the information and use of equipment support where   possible.
  2. The belief that the "system-cracking" for fun and exploration is ethically not anything [OK] for a hacker, cracker remain committed not to steal, destroy and break the boundaries of             confidentiality.
 = (taken, interpreted and edited from the jargon file (version 4.4.4)) =

"Interestingly, it turns out the hacker's happening strata (levels) given by the hacker community to someone because of his skill, not because of age or seniority. I'm sure not everyone agrees with degrees that will be described here, because there is the impression of arrogance, especially in high level. to obtain recognition / degrees, a hacker must be able to create a program to exploit weaknesses in the system, write a tutorial (article), an active discussion on the mailing list, create a web site and so on. "

Hacker hierarchy
============
Maybe a bit too rough if the call hierarchy / levels hackers; I believe the term is not fully accepted     by the hacker community. I therefore apologize in advance. In general, the most high (temperature)   hackers often called 'Elite'; in Indonesia may be more often called 'temperature'. Meanwhile, at the other end of the degree of hackers known as 'wanna-be' hackers known as 'Lamers'.

Elite:
Also known as 3l33t, 3l337, 31337 or a combination of it; is spearheading the network security industry. They understand the operating system, able to configure and connect a global network. Capable of programming every day. A very natural grace, they are usually efficient and skilled, to use knowledge appropriately. They like stealth can enter the system without in the know, although they will not destroy the data. Because they always follow the rules.

Semi Elite:
Hackers are usually younger than the Elite. They also have the ability and extensive knowledge of computers. They understand about the operating system (including holes). Usually equipped with a small number of programs sufficient to alter the program exploits. Many of the attacks were conducted by hackers published this caliber, unfortunately by the Elite they are often categorized Lamer.

Developed Kiddie:
This designation is mainly because this age group is young and still in school. They read about the methods of hacking and how on various occasions. They tried various systems to ultimately succeed and proclaimed victory to another. Generally they still use Graphic user interface (GUI) and just learn the basic of Unix, without being able to find a new loophole in the operating system.

Script Kiddie:
As developed kiddie, Script Kiddie usually do these activities. As also Lamers, they only have the technical knowledge networking is very minimal. Usually can not be separated from the GUI. Hacking is done using a trojan to scare and lived most troublesome Internet users.

Lamer:
They are people without experience and knowledge who want to become hacker (wanna-be hackers). They usually read or hear about a hacker and want to like it. Use their computers mainly to play games, IRC, exchange private software, steal credit card. Usually hacking using Trojan software, nuke and DoS. Usually brag on IRC channels, etc.. Because many shortcomings to achieve elite, in their development will only be up to the level of developed kiddie or script kiddie.

Hacker Ethics and Rules
=================
  • Above all, respect knowledge and freedom of information.
  • Inform the system administrator would be a breach of security / security holes that you see.
  • Do not take unfair advantage of the hack.
  • Not distribute and collect the pirated software.
  • Never take stupid risks
  • Always know their own abilities.
  • Always willing to be open / free / free inform and teach a variety of information and methods are obtained.
  • Never hack a system to steal money.
  • Never give access to someone who will make mischief.
  • Never deliberately remove and destroy files on the hacked computer.
  • Respect hacked machine, and treats him like his own machine.
Clear of Ethics & Rules Hackers above, it is clear it is highly unlikely a real hacker will make damage in the computer.
 = (retrieved, and edited by writing: Onno w. Purbo) =

about us

welcome to my blog



i want to introduce my self,
my name is joko santoso
i am from indonesia

i like, 
i love,
and
i want to share computer science and technology in this blog

W32.Welchia.Worm



W32.Welchia.Worm is a worm that is able to exploit the various leaks(vulnerabilities), including:
  • DCOM RPC vulnerability(As described in Microsoft security bulletin MS03-026) using tcp port 135, attacked specifically to Windows XP
  • WebDav vulnerability(as described in security bulletin Microsoft MS03-007) using tcp port80, attacked Machines running IIS 5.0, and will have an impact on the Windows 2000 system, and NT/XP.
also known as:
W32/Welchia.worm10240[AhnLab], W32/Nachi. Worm[McAfee], WORM_MSBLAST.D[Trend], Lovsan.D[F-Secure], W32/Nachi-A[Sophos], Win32.Nachi.A[CA], Worm.Win32.Welchia[KAV]

Type: Worm
Length of infection: 10,240 bytes
Systems can be in infections: Microsoft IIS, Windows 2000, Windows XP
Uninfected systems: Linux, Macintosh, OS/2, UNIX, Windows 3.x, Windows 95, Windows 98, windows Me, Windows NT

Ports used: TCP 135(RPC DCOM), TCP 80(WebDav)

W32.Welchia.Worm currently in execution, it will do:
unite himself to:
%System%\Wins\Dllhost.exe
note, %Sytem% is a variable, the worm will search for the folder and file system unite himself, by default is C:\Winnt\System32(Windows 2000)
or
C:\Windows\System32(Windows XP). coffee file %System%\Dllcache\Tftpd.exe as %System%\Wins\svchost.exe.

note: tftpd is permitted program, making it difficult to detect by antivirus.

add subkeys:
RpcPatch
and:
RpcTftpd

to the registry key in:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services

Make some services:

Service Name: RpcTftpd
Service Display Name: Network Connections Sharing
Service Binary: %System%\wins\svchost.exe

This service will be set to run manually.

Service Name: RpcPatch
Service Display Name: WINS Client
Service Binary: %System%\wins\dllhost.exe

This service will be set to run automatically. The last process is to delete the file% System%\msblast.exe the first place W32.Blaster.Worm

This worm did:
  • Send ICMP packet / ping, to check whether the premises computers ip is active on the network.
  • Once the worm managed to find out that the machine is active on the network it will send data to tcp    port 135 and will exploit the DCOM RPC weaknesses or, will send the date to a tcp port 80 to exploit weaknesses WebDav
  • Create a remote shell for the machine that has been in the exploitation of weaknesses and will try to connect to the attacker's machine using tcp port at random, between 666 and 765 to receive instructions.  
  • Setting up a TFTP server on the attacker's machine and instructed the exploited machine (the victim) to connect and download Dllhost.exe and Svchost.exe from the attacker's machine. If the file %System%\dllcache\tftpd.exe there, then the worm will not download svchost.exe.
  • Check the computer's operating system version, service pack number, and also prevents to connect to Microsoft's Windows Update and prevent the DCOM RPC vulnerability to patch.
To destroy this worm can be done several ways:
  • Use equipment removal W32.Welchia.Worm
  • Removing manually:
1. To disable System Restore (Windows XP).
  • why? Particular XP system restore is enabled by default, why is it dangerous? because of a virus, worm or Trojan that infects your computer may be in the backup also by system restore and that makes it more dangerous is to protect the windows of other programs, including antivirus to modify (quarantine, remove and clean)

    system restore = system restore may be the safest place for viruses et al. Therefore you must disable your system restore.

    to turn off system restore:
    • You need as an administrator(xp)
    • Go to control panel
    • Select system, in the system properties select System restore
    • Check turn off system restore
2. Update the virus definitions of the antivirus is used. you just need to visit the website of your     antivirus, or run the Live Update directly from your antivirus program to perform the update.

3. Restart your computer in save mode to stop the worm. for Windows 95/98 / me you can go into  save mode after the restart, while, for xp / nt / win 2000 you can stop working for a while with the  way the virus:
  • Enter the control panel
  • Select services in the administrative tools
  •  Scroll down until you find
    • Network Connections Sharing
    • WINS Client
  • Right-click and select stop
4. Run a full system scan and delete all the files detected as W32.Welchia.Worm. run a full scan and   antivirus configuration advance you if there is an infected file is found then delete the file   W32.Welchia.Worm

5. Delete values ​​and subkeys are created by a virus in the registry. this is a bit of risk, before you do, first backup your registry
  • Click start and type regedit -ruN
go to the key:
HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services

delete the following subkey:
RpcPatch
and
RpcTftpd
save changes and exit the registry

6. Delete Svchost.exe file.
go to the folder% system% wins and delete all files svchost.exe

ads