Sunday, July 11, 2010

HACKING LINUX, WINDOWS via snapshot

Hello,
Here i am going to share with you about  some simple hacking program developed by me. Hope this should be useful for all & you can further add extra  features if wish. First version of the program is written in Visual Basic 6.0. Since it is easy to learn & have lots of facility so i go for this language.

1st Version:( VB 6.0 & pen drive used to store images )

The main purpose of my program is to take the screen shot (used print screen option) of  a PC(where it is executed ) periodically (say after 1 or 2 minute). After taking 6 or 7 or  x number of pictures it will search my pen drive on that machine. I called here my pen drive cause it will copy all the images done by my program in some specific location as fixed by me ( in C drive now) and then copy it to my pen drive. My program will try to search a file named bd123.txt on the pen drive inserted; if the file  exist then the program will copy all the images taken to my pen drive secretly and at the same time it will delete the folder & continue its executions until you closed the program.However  If the pen /usb drive is not there or if the file does not exist it will continue for searching pen drive & take screen shot. Another interesting point is that the program run in the background and anti virus could not able to detect it. If you want close the program then press CTRL+ALT+DEL then remove it from the menu displayed . If you dont know how to stop better restart your machine. I am not adding this program to load at start up, however it can be easily done. This program will not harm any computer. I called the name of the program Secrete_SS. Here SS means Snap Shot.  

Algorithm:

Until the program is ( stopped forcefully or restart the machine )
Do the following
1. Take n number of screen shot of victim PC & store it some hidden location
2. if number of images are equal to n then search for the  pen drive on that machine & do it periodically after  t times.
3. if pen drive exist then search for a file bd123.txt on that pen drive & if that file exist, it means it is attacker pen drive so copy all images to it & delete the folder where it stored the images.
4. if there is no such file bd123.txt  then continue to step 1.


I upload the source code & exe of the program i made. Before testing make bd123.txt ( content may be blank does not matter ) on your pen drive . This is the first version of the program. I think there is some limitation in the program. Since i am using Visual Basic it can not run on UNIX machine and it is limited to move images to pen drive not remote place. Next step is to make the program  OS independent ( So I use JAVA ) & copy the images to remote place ( i used FTP server ).

2nd version: ( Used JAVA language & FTP-Server to store the images )

Use the same logic to take screen shot & but i uses /tmp/  location to create BD folder (U can give any name ) to store the images ,since in Linux, in other location we may not get the required permission to store images. Also i create a FTP server(  vsftp  ) on a machine  & then run the program in another machine. Then after taking 5/6 snapshot it will try to connect FTP server and after successful login (i used user name & password) it will upload images & continue. Note that name of the images are given according to machine name & appending a sequence no to it. I am able get the name victim machine name with the images.
 
How to Run it:

1. Create a FTP server with a upload folder. I used /home/binod/FTP-shared/upload give the required permission.
2. Run the program on any remote machine (i uses Ubuntu OS & vsftp server ) & it will work,


Note that while using FTP in Java i used third party library from http://commons.apache.org/net/download_net.cgi. So before executing the program make the library available by using export (i think you know it, if you dont know search it on net).


SOURCE CODE DOWNLOAD LINK .. CLICK HERE

4 comments:

  1. ".......My program will try to search a file named bd123.txt on the pen drive inserted; if the file exist then the program will copy all the images taken to my pen drive secretly and............"

    good to know the information..Binod da....your program will look for the for the text file or the content of the text file. If you looking for the text file not the content then you may face some problem like..if I inserted two pen drive and incidentally 1 pen drive contain a file named bd123.txt of my own............

    anyway nice posting

    ReplyDelete
  2. Hi buddy....your hit counter is automatically increases when I hit refresh in my keyboard.[F5].

    ReplyDelete
  3. thanks Navanath for your comment...! You r right..! there are lot of improvement can be done...here..! if i go for content checking it is good..! But instead of choosing bd123.txt simple file name we can use a complex filename/number that can not be easily guessed..!

    U r also right in ur place...

    ReplyDelete
  4. HIT COUNTER INCREASES FOR EVERY F5 PRESS OR REFRESH..! that is developed by somebody like dat way...!

    ReplyDelete