home *** CD-ROM | disk | FTP | other *** search
-
- The Trojan Horse Construction Kit, v2.0ß: Development Tools!
- (C) 1992, Stingray/VIPER.
- Viral Inclined Programming Experts Ring
-
- [----------------------------------------------------------------------------]
-
- It is finally here! Yes, the long awaited THCK, version 2.0ß. First, if
- you have a copy of this program, I would like to make clear a few things.
-
- A) This is a BETA test copy. I decided to release it early because
- people were bugging me and because I thought it might help to get
- some suggestions before finishing the final copy.
-
- B) If you have this, please do not distribute it. I have chosen a few
- sites which I felt had a cool enough SysOp to keep an eye out for who
- is taking this prg. from them and is capable of keeping responsible
- individuals on their board.
-
- C) If I did not upload this to your board, then don't be pissed,
- because I do not call out a whole lot myself so I do not really know
- a whole lot of people. But, I like it this way.
-
- [----------------------------------------------------------------------------]
-
- Two files are currently included. Both are command line interfaced.
-
- THCK-FP : This program will do several file size manipulation
- functions. It can pad a file to a specific length, filling
- the rest with bogus characters and leaving the rest of the
- file in tact, append a certain number of bytes to a file,
- and create new bogus data files. Do not make .COM files
- larger than 65280 bytes, total length. It will leave the
- original file in working order so that it can still be used
- normally. The output from this is pretty much
- uncompressable, so it makes a good "data" file type of thing.
-
- THCK-TC : This is the actual Trojan Constructor. It is totally
- different than v1.0. First and foremost, v1.0's .ASM code
- that was generated was highly buggy, and most of it would
- only trash drives which are 32 megs or smaller in partition
- size. Second, it sucks having to have a compiler to make
- a trojan out of it's output. Both of these have changed.
- Now the output is directly to a .COM file, ready to execute,
- or pad length. But, several other features/enhancements
- were also added. Now, to specify your messages to display,
- you specify a filename which contains the message you wish
- to display to your victim. This file can be up to 15,000
- bytes long. (There are two files - one to display before
- destroying, and one to display after destroying). If you
- were into drawing, these files can be ANSI pictures if you
- like (just make sure the victim has their ANSI driver
- loaded! <grin>). Nonetheless, the 'encryption' is now
- variable and specifiable by the user. In the old version,
- the encryption was stupid, simply adding 75 to each byte of
- your message. Now you simply tell it the number you want to
- add (0 = no encryption). This is really lame encryption, I
- know, but it serves it's purpose for hex editors. Finally,
- if you would like to see your trojan before sending it
- somewhere, you can tell it not to generate any dangerous
- code. Be careful if you use an ANSI which cleas the screen.
- When the death mechanism is in place (which has been fixed
- to destroy drive C: no matter the partition size), only takes
- a split second.
-
- [----------------------------------------------------------------------------]
-
- Upcoming Tools in 2.0 Release: A Time Bomb/Trojan Constructor. This will
- basically take any file you specify, and make it into a time bomb, at
- whichever date you specify. It will continue to run properly, but will
- not spread. However, those great utilities will definately get copied
- a lot!
-
- I am still working on making the Trojan Constructor generate .EXE files. I
- HOPE to get it ready for 2.0, but I do not know. Same goes for the Time
- Bomb Constructor. Currently, what I have done only will be able to "infect"
- a .COM file. Hopefully this will be fixed.
-
- Have a blast!
-
- -> Stingray
-
- Welcome to VIPER: Dr. Bios!
-