التواصل المباشر مع الادارة والاعضاء القدامى من خلال قناة التلغرام



العودة   :: vBspiders Professional Network :: > [ ::. الـقرصـنـة والأختراق ~ The Hidden World Of Hackers .:: ] > قســم إختــراق الأجهــزة > قـسـم الفـايروسات Viruses

 
 
LinkBack أدوات الموضوع انواع عرض الموضوع
قديم 07-31-2010, 10:47 AM   رقم المشاركة : 1 (permalink)
معلومات العضو
nadir hacker
.:: فريق العناكب للفايروسات ::.
 
الصورة الرمزية nadir hacker
 

 

 
إحصائية العضو






nadir hacker غير متواجد حالياً

إرسال رسالة عبر MSN إلى nadir hacker إرسال رسالة عبر Yahoo إلى nadir hacker

 

 

إحصائية الترشيح

عدد النقاط : 10
nadir hacker is on a distinguished road

افتراضي كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ...


السلام عليكم ورحمة الله وبركاته

لقد احضرت لكم كتاب رائع لتعليم صناعة الفيروسات الخطيرة

وهذه قائمة بمحتويات الكتاب....



The Simplest COM Infector
COM Program Operation
Overwriting Viruses
The Search Mechanism
The Replication Mechanism
Discussion
Exercises
Companion Viruses
Executing the Host
File Searching
File Infection
Variations on a Theme
The SPAWNR Virus Listing
Exercises
Parasitic COM Infectors: Part I
The Justin Virus
Checking Memory
Going into the High Segment
The File Search Mechanism
Examining the Host
Infecting the Host
Executing the Host
The Justin Virus Source
Exercises
Parasitic COM Infectors: Part II
The Timid-II Virus
Data and Memory Management
The File Search Routine
Checking the File
The Copy Mechanism
Executing the Host
The Timid-II Virus Listing
Exercises
A Memory Resident Virus
Techniques for Going Resident
The Sequin Virus
Hooking Interrupts
The Pitfalls of Sequin
The Sequin Source
Exercises
Infecting EXE Files
The Structure of an EXE File
Infecting an EXE File
The File Search Mechanism
Passing Control to the Host
The INTRUDER-B Source
Exercises
Advanced Memory Residence Techniques
Low Level Memory Residence
Returning Control to the Host
FCB-Based File Operations
Finding Infectable Files
Infecting Programs
Self-Detection in Memory
Windows Compatibility
Testing the Virus
The Yellow Worm Source Listing
Exercises
An Introduction to Boot Sector Viruses
Boot Sectors
The Necessary Components of a Boot Sector
Interrupt 13H
The BASIC.ASM Boot Sector
The BOOT.ASM Source
A Trivial Boot Sector Virus
A Better Boot Sector Virus
The Infection Process
PC-DOS and DR-DOS Compatibility
Testing Kilroy-B
Kilroy-B Source Listing
Exercises
The Most Successful Boot Sector Virus
The Disk Infection Process
Memory Residence
Infecting Hard Disks
Infecting Floppy Disks
The Logic Bomb
The Stoned Listing
Exercises
Advanced Boot Sector Techniques
Basic Functional Characteristics
The BBS on the Hard Disk
The BBS on Floppy Disk
Self-Detection
Compatibility
The Loader
The BBS Source
The FATMAN Listing
The BOOT.ASM Source
Exercises
Multi-Partite Viruses
Military Police
The MP as a Boot Sector Virus
The MP Turns TSR
Infecting Files
Loading from a File
The Military Police Source
Exercises
Infecting Device Drivers
Step One: The File Structure
Step Two: System Facilities
Step Three: The Infection Strategy
Step Four: Implementation
Assembling a Device Driver
The DEVIRUS Source
Exercises
Windows Viruses
Windows EXE Structure
The Windows EXE New Header
Segment Table (Defines segments in the program)
Resident Name Table (A list of resident names and references)
Non-Resident Name Table
Entry Table (Table of entry points for the program)
Module Reference Table
Imported Name Table (Names of modules imported by the program)
The Resource Table (Vital information about the EXEs resources)
Resource Type Record Definition
Name Info Record Definition
Infecting a File
Using the Windows API
Protected Mode Considerations
Memory Management and DPMI
Getting Up and Running
Implementation as a Windows EXE
Infecting DLLs
General Comments
The Caro Magnum Source
Exercises
An OS/2 Virus
OS/2 Memory Models
OS/2 Programming Tools
The Structure of an Executable File
Function Calls
Memory Management
A New Hoop to Jump Through
And One We Get to Jump Through
The Source Code
Exercises
Unix Viruses
A Basic Virus
The X21 Step by Step
Hiding the Infection
Unix Anti-Virus Measures
The X21 Source
The X23 Source
Exercises
Source Code Viruses
The Concept
The Origin of Source Code Viruses
A Source Code Virus in C
Source Listing for SCV1.C
Source Listing for VIRUS.H
Source Listing for CONSTANT.C
Test Drive
The Compressed Virus
Source Listing for SCV2.C
Source Listing for VIRUS2.HS
A Source Code Virus in Turbo Pascal
Source Listing of SCVIRUS.PAS
Source Listing of ENCODE.PAS
Exercises
Many New Techniques
Exercises
Part II: Anti-Anti Virus Techniques
How A Virus Detector Works
Virus Scanning
Behavior Checkers
Integrity Checkers
Overview
The GBSCAN Program
The GBCHECK Program
The GBINTEG Program
Exercises
Stealth for Boot Sector Viruses
The Anti-Virus Fights Back
Viruses Fight Back
Anti-Viruses Fight Back More
Further Options for Viruses
Memory "Stealth"
Level One Stealth Source
Level Two Stealth Source
Exercises
Stealth Techniques for File Infectors
Self-Identification
The Interrupt 21H Hook
File Search Functions
File Date and Time Function
File Size Function
Handle-Based Read Function 3FH
FCB-Based Read Functions
Move File Pointer Function 42H
EXEC Function 4BH
An Interrupt 13H Hook
The Infection Process
Anti-Virus Measures
Viruses Fight Back
The Slips Source
Exercises
Protected Mode Stealth
Protected Mode Capabilities
I/O Port-Level Stealth
Interrupt Hooking
Memory stealthing
Interrupt Tunnelling
Protected Mode Programming
The Isnt Virus
Hooking Interrupt 21H
Stealthing the Body of the Virus
The Interrupt 0FFH Hook
Protected Mode and Advanced Operating Systems
The Isnt Source
Exercises
Polymorphic Viruses
The Idea
Encryption Technology
Self-Detection
Decryptor Coding
The Random Code Generator
Modifying the Decryptor
The Random Number Generator
Results with Real Anti-Virus Software
Memory-Based Polymorphism
The Many Hoops Source
The Visible Mutation Engine Source
Testing the Many Hoops
Exercises
Retaliating Viruses
Retaliating Against Behavior Checkers
Silence
Logic Bombs
Dis-Installation
An Example
Integrity Checkers
Security Holes
Logic Bombs
Viral Infection Integrity Checking
Defense Against Retaliating Viruses
The Retaliator II Source
The SECREAD.PAS Program
Exercises
Advanced Anti-Virus Techniques
Spectral Analysis
Heuristic Analysis
The FINDVME Source
The FREQ Source
Exercises
Genetic Viruses
Genetic Decision Making
Genetic Mutation
Darwinian Evolution
Real-World Evolution
Fighting the Evolutionary Virus
The Next Generation
The GENE.ASM Source
Exercises
Who Will Win?
A Corollary to the Halting Problem
The Problem
The Future of Computing
So Who Will Win?




رابط تحميل الكتاب

http://vx.netlux.org/lib/files/vml01/gbbfirst.zip

مع السلامة




;jhf The Giant Black Book Of Computer Viruses hjugdl wkhum hgtdv,sJJJhj hgo'dvm ! >>>

التوقيع

http://www2.0zz0.com/2010/07/27/13/736941237.jpg

 

   

رد مع اقتباس
 

مواقع النشر (المفضلة)


تعليمات المشاركة
لا تستطيع إضافة مواضيع جديدة
لا تستطيع الرد على المواضيع
لا تستطيع إرفاق ملفات
لا تستطيع تعديل مشاركاتك

BB code is متاحة
كود [IMG] متاحة
كود HTML معطلة
Trackbacks are متاحة
Pingbacks are متاحة
Refbacks are متاحة

الانتقال السريع

المواضيع المتشابهه
الموضوع كاتب الموضوع المنتدى مشاركات آخر مشاركة
حصريا الكتاب الاسود ^^ black book NEVER HaCKEr قـسـم إخـتـراق الـمـواقـع والـسـيرفـرات 13 02-20-2015 02:58 PM
الفايروسات الخطيرة AbO-Ra3d قـسـم الفـايروسات Viruses 9 12-29-2013 04:22 AM


الساعة الآن 11:16 PM


[ vBspiders.Com Network ]

SEO by vBSEO 3.6.0