![]() |
كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... السلام عليكم ورحمة الله وبركاته لقد احضرت لكم كتاب رائع لتعليم صناعة الفيروسات الخطيرة وهذه قائمة بمحتويات الكتاب.... The Simplest COM Infector COM Program Operation Overwriting Viruses The Search Mechanism The Replication Mechanism Discussion Exercises Companion Viruses Executing the Host File Searching File Infection Variations on a Theme The SPAWNR Virus Listing Exercises Parasitic COM Infectors: Part I The Justin Virus Checking Memory Going into the High Segment The File Search Mechanism Examining the Host Infecting the Host Executing the Host The Justin Virus Source Exercises Parasitic COM Infectors: Part II The Timid-II Virus Data and Memory Management The File Search Routine Checking the File The Copy Mechanism Executing the Host The Timid-II Virus Listing Exercises A Memory Resident Virus Techniques for Going Resident The Sequin Virus Hooking Interrupts The Pitfalls of Sequin The Sequin Source Exercises Infecting EXE Files The Structure of an EXE File Infecting an EXE File The File Search Mechanism Passing Control to the Host The INTRUDER-B Source Exercises Advanced Memory Residence Techniques Low Level Memory Residence Returning Control to the Host FCB-Based File Operations Finding Infectable Files Infecting Programs Self-Detection in Memory Windows Compatibility Testing the Virus The Yellow Worm Source Listing Exercises An Introduction to Boot Sector Viruses Boot Sectors The Necessary Components of a Boot Sector Interrupt 13H The BASIC.ASM Boot Sector The BOOT.ASM Source A Trivial Boot Sector Virus A Better Boot Sector Virus The Infection Process PC-DOS and DR-DOS Compatibility Testing Kilroy-B Kilroy-B Source Listing Exercises The Most Successful Boot Sector Virus The Disk Infection Process Memory Residence Infecting Hard Disks Infecting Floppy Disks The Logic Bomb The Stoned Listing Exercises Advanced Boot Sector Techniques Basic Functional Characteristics The BBS on the Hard Disk The BBS on Floppy Disk Self-Detection Compatibility The Loader The BBS Source The FATMAN Listing The BOOT.ASM Source Exercises Multi-Partite Viruses Military Police The MP as a Boot Sector Virus The MP Turns TSR Infecting Files Loading from a File The Military Police Source Exercises Infecting Device Drivers Step One: The File Structure Step Two: System Facilities Step Three: The Infection Strategy Step Four: Implementation Assembling a Device Driver The DEVIRUS Source Exercises Windows Viruses Windows EXE Structure The Windows EXE New Header Segment Table (Defines segments in the program) Resident Name Table (A list of resident names and references) Non-Resident Name Table Entry Table (Table of entry points for the program) Module Reference Table Imported Name Table (Names of modules imported by the program) The Resource Table (Vital information about the EXEs resources) Resource Type Record Definition Name Info Record Definition Infecting a File Using the Windows API Protected Mode Considerations Memory Management and DPMI Getting Up and Running Implementation as a Windows EXE Infecting DLLs General Comments The Caro Magnum Source Exercises An OS/2 Virus OS/2 Memory Models OS/2 Programming Tools The Structure of an Executable File Function Calls Memory Management A New Hoop to Jump Through And One We Get to Jump Through The Source Code Exercises Unix Viruses A Basic Virus The X21 Step by Step Hiding the Infection Unix Anti-Virus Measures The X21 Source The X23 Source Exercises Source Code Viruses The Concept The Origin of Source Code Viruses A Source Code Virus in C Source Listing for SCV1.C Source Listing for VIRUS.H Source Listing for CONSTANT.C Test Drive The Compressed Virus Source Listing for SCV2.C Source Listing for VIRUS2.HS A Source Code Virus in Turbo Pascal Source Listing of SCVIRUS.PAS Source Listing of ENCODE.PAS Exercises Many New Techniques Exercises Part II: Anti-Anti Virus Techniques How A Virus Detector Works Virus Scanning Behavior Checkers Integrity Checkers Overview The GBSCAN Program The GBCHECK Program The GBINTEG Program Exercises Stealth for Boot Sector Viruses The Anti-Virus Fights Back Viruses Fight Back Anti-Viruses Fight Back More Further Options for Viruses Memory "Stealth" Level One Stealth Source Level Two Stealth Source Exercises Stealth Techniques for File Infectors Self-Identification The Interrupt 21H Hook File Search Functions File Date and Time Function File Size Function Handle-Based Read Function 3FH FCB-Based Read Functions Move File Pointer Function 42H EXEC Function 4BH An Interrupt 13H Hook The Infection Process Anti-Virus Measures Viruses Fight Back The Slips Source Exercises Protected Mode Stealth Protected Mode Capabilities I/O Port-Level Stealth Interrupt Hooking Memory stealthing Interrupt Tunnelling Protected Mode Programming The Isnt Virus Hooking Interrupt 21H Stealthing the Body of the Virus The Interrupt 0FFH Hook Protected Mode and Advanced Operating Systems The Isnt Source Exercises Polymorphic Viruses The Idea Encryption Technology Self-Detection Decryptor Coding The Random Code Generator Modifying the Decryptor The Random Number Generator Results with Real Anti-Virus Software Memory-Based Polymorphism The Many Hoops Source The Visible Mutation Engine Source Testing the Many Hoops Exercises Retaliating Viruses Retaliating Against Behavior Checkers Silence Logic Bombs Dis-Installation An Example Integrity Checkers Security Holes Logic Bombs Viral Infection Integrity Checking Defense Against Retaliating Viruses The Retaliator II Source The SECREAD.PAS Program Exercises Advanced Anti-Virus Techniques Spectral Analysis Heuristic Analysis The FINDVME Source The FREQ Source Exercises Genetic Viruses Genetic Decision Making Genetic Mutation Darwinian Evolution Real-World Evolution Fighting the Evolutionary Virus The Next Generation The GENE.ASM Source Exercises Who Will Win? A Corollary to the Halting Problem The Problem The Future of Computing So Who Will Win? رابط تحميل الكتاب http://vx.netlux.org/lib/files/vml01/gbbfirst.zip مع السلامة |
[align=center]جزآك الله خيرآ أخي الكريم[/align] |
الف شكر جاري التحميل |
مشكوررررررررررررررررررررررررررررررررررر يا اخي العزيز |
مشكور يا أخي وبارك الله فيك |
جزاك الله خير الجزاء |
جزاك الله بخير |
بارك الله فيك |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... مشكووووووور اخي العزيز |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... جميل انا اشكر مدير المنتدى وكل من يشارك بهذه البرامج اخوكم المخلص |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... :showoff::showoff::showoff::clap::12: |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... thanxxxxxxxxxxxxxxxxxxxxxxxxxxxx |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... merci |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... مشكووووووووووووووور:2: |
رد: كتاب The Giant Black Book Of Computer Viruses اتعليم صناعة الفيروســـات الخطيرة ! ... شكرا أخي |
الساعة الآن 03:48 PM |
[ vBspiders.Com Network ]