home *** CD-ROM | disk | FTP | other *** search
-
- The Trojan Horse Construction Kit, v2.0: Development Tools!
- (C) 1992, Stingray/VIPER.
- Viral Inclined Programming Experts Ring
-
- [----------------------------------------------------------------------------]
-
- Well, after spending a few more hours of work on it, I have finally
- finished this puppy up. I suppose I should give some info on it rather than
- just bullshit up here, so let's get to the good stuff...
-
- [----------------------------------------------------------------------------]
-
- First thing to note: THCK-TC.EXE and THCK-TBC.EXE will >>ONLY<< work with
- COM files. If you attempt to use THCK-TBC.EXE on an EXE or overlay of some
- sort, then you will fuck the file over. THCK-TC.EXE will generate whatever
- filename you specify, if you make an EXE, it will still execute, but only
- because DOS sees there is no EXE header so it loads it like a COM file.
-
- [-------------------------------<<< THCK-TC >>>------------------------------]
-
- This is the actual trojan constructor. With this command line utility, you
- can construct a trojan horse to your likings. It has less flexibility than
- 1.0, except that it is far more powerful with what it does. First, if you
- don't have v1.0, then don't get it, because there are some bugs in the code
- it generates. I have worked out bugs from here, except there are a few
- limitations with the various functions.
-
- First, all the destruction routines will default to attacking drive C. The
- int 13 methods are more powerful than the 26, but 26 is a bit nicer and
- still does plenty of damage. Some lame TSRs will not catch it. Most will
- catch the int 13's. Funny thing is that int 26 just sets up parameters
- using dos and calls int 13. Anyways, so if you are real worried, use that.
- BUT, that will only trash a partition if the size is 32 megs or less. If the
- partition is larger, then it will be completely unaffected.
-
- There are two int 13 methods. The write sectors will completely pulverize
- the partition table, MBR, and a good chunk of the beginning of the poor souls
- hard drive. I have tested this out and it works nicely on my testing hard
- drive. It will trash partitions of any size. And, the damage is kinda
- sweet, since after it trashes the sectors, everything will seem okay, but
- as soon as they reboot, it will make them re fdisk and format their drive
- because they have no partition table. Hahahahahaha. The other method just
- simply formats tracks. It does this WITHOUT setting up a proper parameter
- block, and just takes a piece of memory and says that it will use that as its
- guide to what to obliterate. So, this can also cause a pretty big mess, but
- it all depends on what is in two registers at the time of trashing. If there
- isn't anything fancy there, then it might not do very much.
-
- Next, you need to specify three filenames to Trojan Constructor. The first
- two are your messages, the third is the filename (do not include COM
- extention; it will be appended automatically for you). The message files
- can be up to 15,000 bytes long. They can be ASCII, ANSI pictures, or
- just whatever the hell you want to make to display to your victim(s). Note
- though, if you clear the screen, the first message may be cleared too fast
- (It trashes quickly - well under a second). Nonetheless, I put in a function
- that will allow you to run the output file without it causing damage so that
- you can test it out and see how it looks to make sure it is cool.
-
- You may now use somewhat variable encryption with the message files. This
- is done by specifying a number 0-255 to add to each byte. It would not be
- difficult to crack, but if you had a person who you wanted to look at it
- with a hex editor, he would not see any text strings in it because it would
- look jumbled. Nonetheless, that serves its purpose well.
-
- For command line information, simply run the program and a screen will come
- up telling you all the parameters.
-
- [-------------------------------<<< THCK-FP >>>------------------------------]
-
- This simple utility is a file size manipulator. With this, you can create
- files of any length, pad out files to a specific length, or even append a
- certain number of bytes to a file. To create a bogus file, simply specify
- a filename which does not exist in the currently logged directory. Run
- this, too, for a description of the command line interface.
-
- [-------------------------------<<< THCK-TBC >>>-----------------------------]
-
- This program is new to the Construction Kit. This powerful utility will
- turn any COM program into a Time Bomb. Simply specify a COM file and a date,
- and it will do the rest! Simply execute this alone for command line options.
-
- Well, I hope that you people are able to cause some serious chaos with this.
- Feel free to place time bombs on all your favorite COM ANSI designs by the
- lamest of all cracker groups and shit like that. Rezip it up and send it
- around. Scan 89 didn't say it was a virus, and it's not, so there shouldn't
- be much problem with this at all. The file will run perfectly until the
- date either is or has passed, when it will do the equivalent of the write
- sectors function using int 13 in the trojan constructor. After all, the
- best virus is the copy command - "Copy me, I want to travel" a famous virus
- once tried to say.
-
- [----------------------------------------------------------------------------]
-
- Have fun with this shit...
-
- Greetings...!: Decimator and the SKISM crew, Invalid Media and the NuKE
- crew, and a big greet to The Evil Master.
-
- Are you interested in supplying VIPER, or joining? Contact us on a decent
- trashing oriented BBS near you!
-