Tuesday, April 28, 2020

Sub Seven Virus Essay Example For Students

Sub Seven Virus Essay Imagine this, youre at home playing on the computer when suddenly your cd drive opens. You brush it off as it were nothing unusual but then a few minutes go by and out of nowhere you printer starts printing a page that says you have a virus that allows people total access your files. You begin to panic when a message window pops up and its the person that printed that out. He tells you that the virus you have is called the subseven virus. I didnt have to hard of a time imagining that situation because it really happened to me. The guy that informed me of having the virus told me where I could download the program to access people files. So I, being the curious type downloaded and proceeded to get into peoples computers. I have to admit it is pretty fun messing with people. I didnt delete anyones files I just looked around and when I was done having a little fun with the person I told them that they had the subseven virus. We will write a custom essay on Sub Seven Virus specifically for you for only $16.38 $13.9/page Order now The operating program was well developed. It has a lot of options some of these options include flipping the victims screen, take control of mouse, revealing cached passwords, open cd rom drive, disable keyboard, turn monitor off, and much much more. My personal favorite option was the ability to access the c-drive and see what the person has on their computer. Subseven was discovered in May 1999. The creator calls himself ?Mobman.? Subseven is a Windows 9x Internet Backdoor trojan. When running it gives virtually unlimited access to the system over the Internet to anyone running the appropriate client program. Subseven uses a persons ip address to access the system. It installs three files onto the computer. The first being NODLL.EXE which is installed into the windows folder and is used to load the trojan server. The next file is known as BackDoor-G.srv. This one is also installed into the windows folder and is the actual trojan that receives and carries out the commands from the client program. This file is usually the first file the user gets. The next file is used by the trojan server program to watch for connections to the internet from the client software. This file is identified as BackDoor-G.dll. The Trojan also registers the file extension .dl as an executable file type that can be run by the operating system just like any .exe fi le. This allows the attacker to download files onto the victims system and run them. Because the extension is not usually associated with executable files some virus scanners will not scan these files and the victim will not suspect these files. You may be asking yourself ?How can I tell if I have the virus Well here are some indications that youve been infected. Files copied to the local system, changes to system registry, and strange or unexplained dialogue boxes on the machine with conversation or keystrokes entered without your instructing to do so. I hope my report gave you some new insight on a tricky little virus that can really mess up your computer. I have added the full list of options on the subseven program. Fun Manager1. Open Web Browser to specified location. 2. Restart Windows. 3. Reverse Mouse buttons. 4. Hide Mouse Pointer. 5. Move Mouse. 6. Mouse Trail Config. 7. Set Volume. 8. Record Sound file from remote mic. 9. Change Windows Colors / Restore. 10. Hang up Internet Connection. 11. Change Time. 12. Change Date. 13. Change Screen resolution. 14. Hide Desktop Icons / Show15. Hide Start Button / Show16. Hide taskbar / Show17. Opne CD-ROM Drive / Close18. Beep computer Speaker / Stop19. Turn Monitor Off / On20. Disable CTRL+ALT+DEL / Enable21. Turn on Scroll Lock / Off22. Turn on Caps Locl / Off23. Turn on Num Lock / OffConnection Manager1. Connect / Disconnect2. IP Scanner3. IP Address book4. Get Computer Name5. Get User Name6. Get Windows and System Folder Names7. Get Computer Company8. Get Windows Version9. Get Windows Platform10. Get Current Resolution11. Get DirectX Version12. Get Current Bytes per Pixel settings13. Get CPU Vendor14. Get CPU Speed15. Get Hard Drive Size16. Get Hard Drive Free Space17. Change Server Port18. Set Server Password19. Update Server20. Close Server21. Remove Server22. ICQ Pager Connection Notify23. IRC Connection Notify24. E-Mail Connection NotifyKeyboard Manager-1. Enable Key Logger / Disable2. Open Key Logger in a remote Window3. Clear the Key Logger Windows4. Collect Keys pressed while Off line5. Open Chat Victim + Controller6. Open Chat among all connectedControllers1. Windows Pop-up Message Manager2. Disable Keyboard3. Send Keys to a remote WindowMisc. Manager-1. Full Screen Capture2. Continuous Thumbnail Capture3. Flip Screen4. Open FTP Server5. Find Files6. Capture from Computer Camera7. List Recorded Passwords8. List Cached Passwords9. Clear Password List10. Registry Editor11. Send Text ot PrinterFile Manager-1. Show files/folders and navigate2. List Drives3. Execute Application4. Enter Manual Command5. Type path Manually6. Download files7. Upload files8. Get File Size9. Delete File10. Play *.WAV11. Set Wallpaper12. Print *.TXT*.RTF file13. Show ImageWindow Manager1. List visible windows2. List All Active Applications3. Focus on Window4. Close Window5. Disable X (close) button6. Hide a Window from view. .u31577fca1158196d61706ce94410c9cc , .u31577fca1158196d61706ce94410c9cc .postImageUrl , .u31577fca1158196d61706ce94410c9cc .centered-text-area { min-height: 80px; position: relative; } .u31577fca1158196d61706ce94410c9cc , .u31577fca1158196d61706ce94410c9cc:hover , .u31577fca1158196d61706ce94410c9cc:visited , .u31577fca1158196d61706ce94410c9cc:active { border:0!important; } .u31577fca1158196d61706ce94410c9cc .clearfix:after { content: ""; display: table; clear: both; } .u31577fca1158196d61706ce94410c9cc { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u31577fca1158196d61706ce94410c9cc:active , .u31577fca1158196d61706ce94410c9cc:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u31577fca1158196d61706ce94410c9cc .centered-text-area { width: 100%; position: relative ; } .u31577fca1158196d61706ce94410c9cc .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u31577fca1158196d61706ce94410c9cc .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u31577fca1158196d61706ce94410c9cc .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u31577fca1158196d61706ce94410c9cc:hover .ctaButton { background-color: #34495E!important; } .u31577fca1158196d61706ce94410c9cc .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u31577fca1158196d61706ce94410c9cc .u31577fca1158196d61706ce94410c9cc-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u31577fca1158196d61706ce94410c9cc:after { content: ""; display: block; clear: both; } READ: Gateway to heaven Ouch, je je I"m telling mamma! I yelled in agony, rubbing the imprint her book left on my head Essay7. Show a Hidden Window8. Disable Window9. Enable Disabled WindowOptions Menu-1. Set Quality of Full Screen Capture2. Set Quality of Thumbnail Capture3. Set Chat font size and Colors4. Set Clients User Name5. Set local Download Directory6. Set Quick Help7. Set Client Skin8. Set Fun Manager SkinEdit Server1. PreSet Target Port2. PreSet server Password3. Attach EXE File4. PreSet filename after installation5. PreSet Registry Key6. PreSet Autostart Method:Registry system files start up folders 7. PreSet Fake error message8. PreSet Connection Notify Username9. PreSet Connection Notify ICQ#10. PreSet Connection Notify E-Mail11. PreSet Connection Notify IRC Chan. 12. PreSet IRC Port13. Change Server *.exe IconComputers and Internet

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.