Virus programming in c




















This virus is so simple to create. The only thing you need to know is how to approach the setting menu of your computer. The source code is short. The first line is to reach the setting menu of your system and the second line to shut it down.

It is not so harmful to test this virus on your computer. Save and close all the important programs and run. If you want to develop this computer virus using C source code compiled in Turbo C, run the. It will restart your computer after some time. The virus has can jam your hard disk, so do not run it. The source code is such that it will make a self growing file in your computer which grows to a few MB, and may continue infinitely.

Again, the source codes here are for academic purpose only. Do not misuse them by spreading to any computer. Your queries, feedbacks and suggestions regarding this tutorial can be mentioned in the comments section.

Also, if you have a different computer virus C source code, share it in the comments. Friday, January 14, Code with C. C Tutorial How To? Maintain Employees List in. DAT file in C. Opening and Reading a Text File in C. This is described in detail in the post itself. Please, go through it thoroughly. Please enter your comment! Please enter your name here. You have entered an incorrect email address!

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. Do not sell my personal information. Welcome back! Before continuing on with Malicious Logic, I request you to have a look at this great and informative article Worms, Viruses and Beyond!!

Now, this article will focus more on applications than theory of computer viruses, worms, and Trojan horses. But, please note that this article is meant to be used for educational purposes only. I, in no way, promote the usage of viruses, worms, or trojan horses to attack computer systems and causing damage. Now, what setuid programs do is that they create processes with UID of the owner and not of a third person executing the program.

This means, that an executor will have the rights of the owner… This in itself is a possible vulnerability. Coming back to our script, so a setuid copy of the UNIX shell was created. Later on, this program is deleted, and then the correct ls command for listing the files and folders present in the current working directory is executed.

Trojan Horses Go back to the previous script… Suppose if someone root typed:. Skip to content. Change Language. Related Articles.

Table of Contents. Improve Article. Save Article. Like Article.



0コメント

  • 1000 / 1000