Sub Seven Virus Essay Research Paper Imagine

Sub Seven Virus Essay, Research Paper

Imagine this, you? re at place playing on the computing machine when all of a sudden your cadmium thrust opens. You brush it off as it were nil unusual but so a few proceedingss go by and out of nowhere you printer starts publishing a page that says & # 8220 ; you have a virus that allows people entire entree your files. & # 8221 ; You begin to panic when a message window pops up and it? s the individual that printed that out. He tells you that the virus you have is called the subseven virus.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

I didn & # 8217 ; Ts have to hard of a clip conceive ofing that state of affairs because it truly happened to me. The cat that informed me of holding the virus told me where I could download the plan to entree people files. So I, being the funny type downloaded and proceeded to acquire into people & # 8217 ; s computing machines. I have to acknowledge it is pretty merriment messing with people. I didn? t delete anyone? s files I merely looked about and when I was done holding a small merriment with the individual I told them that they had the subseven virus.

The operating plan was good developed. It has a batch of options some of these options include tossing the victim? s screen, take control of mouse, uncovering cached watchwords, unfastened cadmium read-only memory thrust, disable keyboard, turn proctor off, and much much more. My personal favourite option was the ability to entree the c-drive and see what the individual has on their computing machine.

Subseven was discovered in May 1999. The Godhead calls himself? Mobman. ? Subseven is a Windows 9x Internet Backdoor Trojan. When running it gives virtually limitless entree to the system over the Internet to anyone running the appropriate client plan. Subseven uses a individual? s information science reference to entree the system. It installs three files onto the computing machine. The first being NODLL.EXE which is installed into the Windowss booklet and is used to lade the Trojan waiter. The following file is known as BackDoor-G.srv. This 1 is besides installed into the Windowss booklet and is the existent Trojan that receives and carries out the bids from the client plan. This file is normally the first file the user gets. The following file is used by the Trojan waiter plan to watch for connexions to the cyberspace from the client package. This file is identified as BackDoor-G.dll. The Trojan besides registers the file extension.dl as an feasible file type that can be run by the operating system merely like any.exe file. This allows the aggressor to download files onto the victims system and run them. Because the extension is non normally associated with feasible files some virus scanners will non scan these files and the victim will non surmise these files.

You may be inquiring yourself? How can I state if I have the virus? ? Well here are some indicants that you? ve been infected. Files copied to the local system, alterations to system register, and unusual or unexplained duologue boxes on the machine with conversation or key strokes entered without your instructing to make so.

I hope my study gave you some new penetration on a slippery small virus that can truly mess up your computing machine. I have added the full list of options on the subseven plan.

Fun Manager

& # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;

1. Open Web Browser to stipulate location.

2. Restart Windows.

3. Reverse Mouse buttons.

4. Hide Mouse Pointer.

5. Move Mouse.

6. Mouse Trail Config.

7. Set Volume.

8. Record Sound file from distant mic.

9. Change Windows Colors / Restore.

10. Hang up Internet Connection.

11. Change Time.

12. Change Date.

13. Change Screen declaration.

14. Hide Desktop Icons / Show

15. Hide Start Button / Show

16. Hide taskbar / Show

17. Opne CD-ROM Drive / Close

18. Beep computing machine Speaker / Stop

19. Turn Monitor Off / On

20. Disable CTR

L+ALT+DEL / Enable

21. Turn on Scroll Lock / Off

22. Turn on Caps Locl / Off

23. Turn on Num Lock / Off

Connection Manager

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ;

1. Connect / Disconnect

2. IP Scanner

3. IP Address book

4. Get Computer Name

5. Get User Name

6. Get Windows and System Folder Names

7. Get Computer Company

8. Get Windows Version

9. Get Windows Platform

10. Get Current Resolution

11. Get DirectX Version

12. Get Current Bytes per Pixel scenes

13. Get CPU Vendor

14. Get CPU Speed

15. Get Difficult Drive Size

16. Get Difficult Drive Free Space

17. Change Server Port

18. Set Server Password

19. Update Waiter

20. Close Server

21. Remove Server

22. ICQ Pager Connection Notify

23. IRC Connection Notify

24. E-Mail Connection Notify

Keyboard Manager

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; –

1. Enable Key Logger / Disable

2. Open Key Logger in a distant Window

3. Unclutter the Key Logger Windows

4. Roll up Keys pressed while Offline

5. Open Chat Victim + Controller

6. Open Chat among all connected

Accountants

& # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;

1. Windows Pop-up Message Manager

2. Disable Keyboard

3. Send Keys to a distant Window

Misc. Manager

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; –

1. Full Screen Capture

2. Continuous Thumbnail Capture

3. Flip Screen

4. Open FTP Server

5. Find Files

6. Capture from Computer Camera

7. List Recorded Passwords

8. List Cached Passwords

9. Clear Password List

10. Register Editor

11. Send Text ot Printer

File Manager

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; –

1. Show files/folders and navigate

2. List Drives

3. Execute Application

4. Enter Manual Command

5. Type way Manually

6. Download files

7. Upload files

8. Get File Size

9. Delete File

10. Play *.WAV

11. Set Wallpaper

12. Print *.TXT*.RTF file

13. Show Image

Window Manager

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;

1. List seeable Windowss

2. List All Active Applications

3. Focus on Window

4. Close Window

5. Disable Ten ( close ) button

6. Hide a Window from position.

7. Show a Hidden Window

8. Disable Window

9. Enable Disabled Window

Options Menu

& # 8212 ; & # 8212 ; & # 8212 ; & # 8212 ; –

1. Set Quality of Full Screen Capture

2. Set Quality of Thumbnail Capture

3. Set Chat font size and Colorss

4. Set Client & # 8217 ; s User Name

5. Set local & # 8216 ; Download & # 8217 ; Directory

6. Set Quick Help

7. Set Client Skin

8. Set Fun Manager Skin

Edit Server

& # 8212 ; & # 8212 ; & # 8212 ; & # 8211 ;

1. PreSet Target Port

2. PreSet waiter Password

3. Attach EXE File

4. PreSet file name after installing

5. PreSet Registry Key

6. PreSet Autostart Method:

Registry & # 8211 ; system files & # 8211 ; get down up booklets

7. PreSet Fake mistake message

8. PreSet Connection Notify Username

9. PreSet Connection Notify ICQ #

10. PreSet Connection Notify Electronic mail

11. PreSet Connection Notify IRC Chan.

12. PreSet IRC Port

13. Change Server *.exe Icon