Advertisement
voodooKobra

Simpsons did it!

Jun 17th, 2014
265
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 14.23 KB | None | 0 0
  1. (Note: This was from ~el8[1] hosted on http://www.gonullyourself.org/ezines/el8/el8.1.txt )
  2.  
  3. ____________________________________
  4. .-' `-.
  5. [14]| THE UNIX VIRUS CHILDRENS MANUAL |[14]
  6. [14]| by: |[14]
  7. [14]| silvio |[14]
  8. `-.____________________________________.-'
  9.  
  10. [BEGIN_DIR] misc
  11. [CUT_HERE] virus.txt
  12. THE UNIX VIRUS CHILDRENS MANUAL
  13.  
  14. - Silvio Cesare <silvio@big.net.au>
  15.  
  16. CONTENTS
  17. --------
  18.  
  19. IMPROVING THIS MANUAL
  20. WHAT IS A VIRUS?
  21. WHAT CAN A UNIX VIRUS DO?
  22. WHAT CAN A WINDOWS VIRUS DO?
  23. WHAT DO UNIX VIRUS'S LOOK LIKE?
  24.  
  25.  
  26. IMPROVING THIS MANUAL
  27. ---------------------
  28.  
  29. For any comments or suggestions (even just to say hi) please contact the author
  30. Silvio Cesare, <silvio@big.net.au>. This paper already has future plans to
  31. include more parasite descriptions and more parasite teqniques. Plus, i plan
  32. on writing a POP-UP book about virus's and how wonderful virus's are.
  33.  
  34.  
  35. WHAT IS A VIRUS?
  36. ----------------
  37.  
  38. A virus is code that infects program files, critical files, processes, ELF's,
  39. and mission critical data. Here are some pictures to help you :)
  40. (Parents: please take time to discuss the pictures, preferably to keep them
  41. from getting scared)
  42.  
  43. A WAREZ infector (The BoW virus):
  44.  
  45. _||||||||||||||||||||||||_
  46. / \
  47. / \_/ \
  48. | \____ _____/ |
  49. | / o /\ /\ o \ |
  50. | \___/ \___/ |
  51. | /\ |
  52. \ ______________________ /
  53. \_ .____| | | |____. _/
  54. \ |___| |___| /
  55. \______________________/
  56. _____| |_____
  57. / \
  58. | |
  59. | / __________ \ |
  60. |\/\/\| I LUV BOW! |\/\/\|
  61. | ~~~~~~~~~~ |
  62. | |
  63. < >
  64. ( b0rn 2 1nf3ct! )
  65. \__________________/
  66.  
  67. Notice, the very sharp hands, and very big head, which contains millions and zillions of program code to infect your system and make it sick.
  68.  
  69. An ELF infector virus (Clifford The Big Red Virus):
  70.  
  71. /-------------\
  72. | , |
  73. | O ^ o |
  74. [| M |]
  75. | U |
  76. \___________/
  77. | | | | | |
  78. / \ \ \ \ / \
  79. / \ |/ \ | \ \
  80. | \|\ // | \
  81. / \ / \ \ / \
  82.  
  83. Notice it's U shaped mouth, which acts as a suction cup. Also, notice
  84. its many many tenticles! They are used to spread throughout your system
  85. very very quickly, and can cause it to instantly die! This is a naughty
  86. virus. One drawback of this virus, is it is:
  87. 1) Very hard to program
  88. 2) Has poor eye site (notice there are no pupils)
  89.  
  90. A windows virus (The BLOB!):
  91.  
  92. _____________________________
  93. ( )
  94. ( )
  95. ( Memo to Sandy: )
  96. ( Hey Sandy ............. )
  97. ( )
  98. (!!!!!!!!!!!!!!!!!!!!!!!!!!!!!)
  99. ( O o O o O o O o O o O o O o )
  100. ( o O o O o O o O o O o O o O )
  101. ( O o O O o o O o o O O o O o )
  102. ( \/\/ \/\/\/\/ \/\/ \/\/\/ \/)
  103. ( @ )
  104. ( /\ /\/\/\ /\/\/\/\ /\/\/\/\ )
  105. ( O o O o O o O o O o O o O o )
  106. ( o O o O o O o O o O o O o O )
  107. ( O o O O o o O o o O O o O o )
  108. (!!!!!!!!!!!!!!!!!!!!!!!!!!!!!)
  109. ( )
  110. ( Aol, no wonder it's #1 )
  111. ( Text file! )
  112. (_____________________________)
  113.  
  114. This virus is very hard to detect. Notice how the nasty mean angry
  115. part of the virus is in the middle, while outside of the virus, it just
  116. looks like a regular file! This virus has many eyes, and viscious teeth! It can trick Norton's, and so forth.
  117.  
  118. The gH virus (LamegHost):
  119.  
  120. , ; , .-'"""'-. , ; ,
  121. \\|/ .' '. \|//
  122. \-;-/ .. \-;-/
  123. // ; ; \\
  124. //__; :. .; ;__\\
  125. `-----\'.'-.....-'.'/-----'
  126. '.'.-.-,_.'.'
  127. '( (..-'
  128. '-'
  129.  
  130. This virus turns your operating system into a flood network, to DoS
  131. people on irc, it also downloads rootshell.com and hack.co.za directly
  132. to your box, and then loads a backdoor into every daemon in inetd.
  133. Very naughty virus, it was used on whitehouse.gov.
  134.  
  135. That sums up the intro, on to WHAT CAN A UNIX VIRUS DO?
  136.  
  137.  
  138. WHAT CAN A UNIX VIRUS DO?
  139. --------------------
  140.  
  141. Virus's are very fascinating, their very existance is superior to that of the
  142. mind controling human. A UNIX virus can do basically anything with the correct
  143. privledges.
  144.  
  145. ME UNIX
  146. o o <- [ Can i have ] 01010101010100 -> [ Why yes ]
  147. _\ [ ROOT access] 01010101010100 [ you may.]
  148. . . [ please ? ] 01010101010101
  149. \____/ 01010101010011
  150. 01010110101010
  151.  
  152. Once you have the correct permissions, here's what you can do:
  153.  
  154. Infect many processes on the system:
  155. _____
  156. .' '.
  157. / O o \
  158. | |
  159. | \ / |
  160. \ '---' /
  161. '._____.'
  162. _____ _____
  163. .' '. .' '.
  164. / O o \ / o O \
  165. | | | |
  166. | \ / | | \ / |
  167. \ '---' / \ '---' /
  168. '._____.' '._____.'
  169. _____ _____ _____
  170. .' '. .' '. .' '.
  171. / O o \ / O O \ / o O \
  172. | | | | | |
  173. | \ / | | \ / | | \ / |
  174. \ '---' / \ '---' / \ '---' /
  175. '._____.' '._____.' '._____.'
  176. _____ _____ _____ _____
  177. .' '. .' '. .' '. .' '.
  178. / o o \ / o O \ / O o \ / o o \
  179. | | | | | | | |
  180. | \ / | | \ / | | \ / | | \ / |
  181. \ '---' / \ '---' / \ '---' / \ '---' /
  182. '._____.' '._____.' '._____.' '._____.'
  183.  
  184. This shows how the virus's spread. Look at each ones eyes, they differ
  185. from the other. This is what we call maximum stealthism! It makes it
  186. hard for virus detectors to find the virus's.
  187.  
  188. Backdoor the systems:
  189.  
  190. (telnet system 31337) (*:backdoor LISTEN)
  191. hacker system
  192. O -> [] -> |----|
  193. < | - |
  194. |\ |____|
  195.  
  196. A hacker (yourself) can gain access to a system, and run even more
  197. virus. Running many virus's is called a "parade" amongst us virus
  198. writers.
  199.  
  200. Destroy your system:
  201.  
  202. $ ls
  203. fork():unable to fork new process
  204. THE SANDMAN VIRUS HAS YOUR WEAK SOUL
  205. THE SANDMAN VIRUS HAS YOUR WEAK SOUL
  206. THE SANDMAN VIRUS HAS YOUR WEAK SOUL
  207. THE SANDMAN VIRUS HAS YOUR WEAK SOUL
  208. THE SANDMAN VIRUS HAS YOUR WEAK SOUL
  209. THE SANDMAN VIRUS HAS YOUR WEAK SOUL
  210. Rewriting MBR...done
  211. Removing init...done
  212. Removing /usr/bin/printf..............done
  213. Rebooting!
  214.  
  215. This virus hides, waiting, forever if it hasto, then, when all
  216. recources are used up, BAM!!!!!!!!!!!! IT DESTROYS YOUR SYSTEM.
  217.  
  218. Expose you to vile paraphanalia:
  219.  
  220. @@@
  221. @. .@
  222. @\=/@
  223. .- -.
  224. o /(.|.)\
  225. | \ ).( /
  226. 8======D~~ '( v )`
  227. |\ \|/
  228. (|)
  229. '-`
  230.  
  231. This virus randomly prints pornographic ascii images to your console.
  232.  
  233.  
  234. In conclusion, a unix virus can do anything to your system. Onto the next
  235. section WHAT CAN A WINDOWS VIRUS DO?
  236.  
  237.  
  238. WHAT CAN A WINDOWS VIRUS DO
  239. ---------------------------
  240.  
  241. Windows95/98 VIRII are very different from UNIX VIRII (VIRII meaning VIRUS
  242. plural). The most popular of Windows95/98 VIRII can be found at
  243. www.virusexchange.com. Some examples of what Windows VIRII can do are:
  244.  
  245. Mess with financial software databses like the Divinci virus.
  246.  
  247. Delete all of your HTTP cookies.
  248.  
  249. Delete your system using the deltree command.
  250.  
  251. Run netbus or back orifice on your system, and make it impossible to remove.
  252.  
  253. Make copies of itself, go into stealth mode, and permutate ( increase
  254. their existance ) themselves like rabbits onto your system.
  255.  
  256. Alter the memory of another process on your system.
  257. ex: Altering notepad when writing critical notes to your friends in
  258. elementary school.
  259.  
  260. Get all of the buddies on your buddy list and send them the trojan, this
  261. happened with the famous internet worm by Robert Morris.
  262.  
  263. Turn your system into a WAREZ server.
  264.  
  265. Get credit card information for your system.
  266.  
  267. Change your bootup system image (to a pornagraphic one, you will likely get
  268. grounded, happyhacker.org teaches you howto do this).
  269.  
  270. Change the shutdown system image (to a pornagraphic one, you will likely get
  271. grounded, happyhacker.org teaches you howto do this).
  272.  
  273. Make really loud annoying sounds at night.
  274.  
  275. Ok, that is the end of this section, onto WHAT DO UNIX VIRUS'S LOOK LIKE?
  276. Parents: Review this material with your children, three times through.
  277.  
  278.  
  279. WHAT DO UNIX VIRUS'S LOOK LIKE?
  280. -------------------------------
  281.  
  282. Unix virii are hard to spot, this section gives you some info on howto spot
  283. them and write them for fun.
  284.  
  285. Smiley the Virus:
  286.  
  287. _____
  288. .' '.
  289. / O o \
  290. | |
  291. | \ / |
  292. \ '---' /
  293. '._____.'
  294.  
  295.  
  296. Dalnet, the Virus:
  297.  
  298. @@@
  299. @. .@
  300. @\=/@
  301. .- -.
  302. o /(.|.)\
  303. | \ ).( /
  304. 8======D~~ '( v )`
  305. |\ \|/
  306. (|)
  307. '-`
  308.  
  309. (NOTE: This is how DALNET got its name)
  310.  
  311.  
  312. The gH virus (LamegHost):
  313.  
  314. , ; , .-'"""'-. , ; ,
  315. \\|/ .' '. \|//
  316. \-;-/ .. \-;-/
  317. // ; ; \\
  318. //__; :. .; ;__\\
  319. `-----\'.'-.....-'.'/-----'
  320. '.'.-.-,_.'.'
  321. '( (..-'
  322. '-'
  323.  
  324. (NOTE: Used in the incredible whitehouse.gov defacement)
  325.  
  326.  
  327. An ELF infector virus (Clifford The Big Red Virus):
  328.  
  329. /-------------\
  330. | , |
  331. | O ^ o |
  332. [| M |]
  333. | U |
  334. \___________/
  335. | | | | | |
  336. / \ \ \ \ / \
  337. / \ |/ \ | \ \
  338. | \|\ // | \
  339. / \ / \ \ / \
  340.  
  341.  
  342. A WAREZ infector (The BoW virus):
  343.  
  344. _||||||||||||||||||||||||_
  345. / \
  346. / \_/ \
  347. | \____ _____/ |
  348. | / o /\ /\ o \ |
  349. | \___/ \___/ |
  350. | /\ |
  351. \ ______________________ /
  352. \_ .____| | | |____. _/
  353. \ |___| |___| /
  354. \______________________/
  355. _____| |_____
  356. / \
  357. | |
  358. | / __________ \ |
  359. |\/\/\| I LUV BOW! |\/\/\|
  360. | ~~~~~~~~~~ |
  361. | |
  362. < >
  363. ( b0rn 2 1nf3ct! )
  364. \__________________/
  365.  
  366.  
  367. Enourmous Penis Virus (Aka, Big John):
  368.  
  369. 8===================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================D
  370.  
  371. (NOTE: This virus fills up your file system, quickly)
  372.  
  373.  
  374. The Million Man March (Aka Lots`o`penis):
  375.  
  376. 8========D~~~ 8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~ 8========D~~~
  377.  
  378. (NOTE: This virus fills up NFS nodes)
  379.  
  380. See you next time! And remember, VIRII ARE FUN! :-D
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement