Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

How do viruses spread?


ghost's Avatar
0 0

First note that I am not asking how to create a virus nor do I plan to create one, I'm just curious. I always hear about how viruses will "inject" their code into existing .exe's so they will be ran when that .exe is ran. How exactly is this done?


ghost's Avatar
0 0

Captain Fritzo wrote: It has nothing to do with that..

They use wormholes!!!

Ask Richo if you want some PoC.

Last time I talked to him on the irc, he was coding a Wormhole class…

Edit: Sorry, it's a good question, I just had to say that xD

Go on…

I know how worms work. I was asking about viruses.


ghost's Avatar
0 0

Captain Fritzo wrote: No No - You Don't understand!

The Virus use the wormhole to travel Into the target file! No No - You Don't know what you're talking about!


ghost's Avatar
0 0

nullbyte00 wrote: [quote]Captain Fritzo wrote: No No - You Don't understand!

The Virus use the wormhole to travel Into the target file No No - You Don't know what you're talking about!

^^^^flamer. internet is ur best frined-PrivacyEXploiter (source wikipedia.org) use ur google:love: Some old viruses, especially on the MS-DOS platform, make sure that the "last modified" date of a host file stays the same when the file is infected by the virus. This approach does not fool anti-virus software, however, especially that which maintains and dates Cyclic Redundancy Codes on file changes.

Some viruses can infect files without increasing their sizes or damaging the files. They accomplish this by overwriting unused areas of executable files. These are called cavity viruses. For example the CIH virus, or Chernobyl Virus, infects Portable Executable files. Because those files had many empty gaps, the virus, which was 1 KB in length, did not add to the size of the file.

Some viruses try to avoid detection by killing the tasks associated with antivirus software before it can detect them.

As computers and operating systems grow larger and more complex, old hiding techniques need to be updated or replaced. Defending a computer against viruses may demand that a file system migrate towards detailed and explicit permission for every kind of file access.


ghost's Avatar
0 0

albertyockvich wrote: internet is ur best frined-PrivacyEXploiter

yay i has a best frined!!1!one!!


ghost's Avatar
0 0

Folk Theory wrote: yay i has a best frined!!1!one!!

^^^^^^^^^^What is wrong with this dude? Got some mental disoder?


ghost's Avatar
0 0

some viruses travel through email. Somone get's the virus the viruses logs into their email and sends the virus to everyone on their contacts list. and so on…


ghost's Avatar
0 0

Eman861 wrote: some viruses travel through email. Somone get's the virus the viruses logs into their email and sends the virus to everyone on their contacts list. and so on…

^^^^^^U philipines?


ghost's Avatar
0 0

Six Degrees of Seperation Theory::

The SDoS Theory simply states that every single person on this planet is only seperated by six other people. ^^I think that's how it goes…

But yes, the spreading of a virus could be described the same way. As with email, assuming the victom opens the email, it would spread like a virtual plague.

(Yayyyyyyyyyyy :ninja: )