Results 1 to 9 of 9

Thread: How do worms work?

  1. #1
    Senior Member
    Join Date
    May 2002

    How do worms work?

    I know that worms allow a hacker to take control of your PC, e.g. opening the CD tray, restarting it, moving files, etc, and obviously for some of these activites the computer needs to be switched on, but can worms be used when the victims computer is switched off, for example to move files?

  2. #2
    Senior Member
    Join Date
    Dec 2001
    From Symantec (specifically http://service4.symantec.com/SUPPORT...2?OpenDocument ):

    You want to know more about computer viruses and how they differ from trojans, worms, and hoaxes.

    The term virus is often used as a generic reference to any malicious code that is not, in fact, a true computer virus. This document discusses viruses, Trojans, worms, and hoaxes and ways to prevent them.

    What is a virus?

    A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria:

    It must execute itself. It will often place its own code in the path of execution of another program.
    It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike.
    Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss.

    There a five recognized types of viruses:
    File infector viruses: File infector viruses infect program files. These viruses normally infect executable code, such as .com and .exe files. The can infect other files when an infected program is run from floppy, hard drive, or from the network. Many of these viruses are memory resident. After memory becomes infected, any noninfected executable that runs becomes infected. Examples of known file infector viruses include Jerusalem and Cascade.
    Boot sector viruses: Boot sector viruses infect the system area of a disk--that is, the boot record on floppy disks and hard disks. All floppy disks and hard disks (including disks containing only data) contain a small program in the boot record that is run when the computer starts up. Boot sector viruses attach themselves to this part of the disk and activate when the user attempts to start up from the infected disk. These viruses are always memory resident in nature. Most were written for DOS, but, all PCs, regardless of the operating system, are potential targets of this type of virus. All that is required to become infected is to attempt to start up your computer with an infected floppy disk Thereafter, while the virus remains in memory, all floppy disks that are not write protected will become infected when the floppy disk is accessed. Examples of boot sector viruses are Form, Disk Killer, Michelangelo, and Stoned.
    Master boot record viruses: Master boot record viruses are memory resident viruses that infect disks in the same manner as boot sector viruses. The difference between these two virus types is where the viral code is located. Master boot record infectors normally save a legitimate copy of the master boot record in an different location. Windows NT computers that become infected by either boot sector viruses or master boot sector viruses will not boot. This is due to the difference in how the operating system accesses its boot information, as compared to Windows 95/98. If your Windows NT systems is formatted with FAT partitions you can usually remove the virus by booting to DOS and using antivirus software. If the boot partition is NTFS, the system must be recovered by using the three Windows NT Setup disks. Examples of master boot record infectors are NYB, AntiExe, and Unashamed.
    Multi-partite viruses: Multi-partite (also known as polypartite) viruses infect both boot records and program files. These are particularly difficult to repair. If the boot area is cleaned, but the files are not, the boot area will be reinfected. The same holds true for cleaning infected files. If the virus is not removed from the boot area, any files that you have cleaned will be reinfected. Examples of multi-partite viruses include One_Half, Emperor, Anthrax and Tequilla.
    Macro viruses: These types of viruses infect data files. They are the most common and have cost corporations the most money and time trying to repair. With the advent of Visual Basic in Microsoft's Office 97, a macro virus can be written that not only infects data files, but also can infect other files as well. Macro viruses infect Microsoft Office Word, Excel, PowerPoint and Access files. Newer strains are now turning up in other programs as well. All of these viruses use another program's internal programming language, which was created to allow users to automate certain tasks within that program. Because of the ease with which these viruses can be created, there are now thousands of them in circulation. Examples of macro viruses include W97M.Melissa, WM.NiceDay and W97M.Groov.

    What is a Trojan horse?

    Trojan Horses are impostors--files that claim to be something desirable but, in fact, are malicious. A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan Horse to spread, you must, in effect, invite these programs onto your computers--for example, by opening an email attachment. The PWSteal.Trojan is a Trojan.

    What is a worm?

    Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. PrettyPark.Worm is a particularly prevalent example.

    What is a virus hoax?

    Virus hoaxes are messages, almost always sent by email, that amount to little more than chain letters. Some of the common phrases used in these hoaxes are:
    If you receive an email titled [email virus hoax name here], do not open it!
    Delete it immediately!
    It contains the [hoax name] virus.
    It will delete everything on your hard drive and [extreme and improbable danger specified here].
    This virus was announced today by [reputable organization name here].
    Forward this warning to everyone you know!

    Most virus hoax warnings do not deviate far from this pattern. If you are unsure if a virus warning is legitimate or a hoax, additional information is available at:


    What is not a virus?

    Because of the publicity that viruses have received, it is easy to blame any computer problem on a virus. The following are not likely to be caused by a virus or other malicious code:
    Hardware problems. There are no viruses that can physically damage computer hardware, such as chips, boards, and monitors.
    The computer beeps at startup with no screen display. This is usually caused by a hardware problem during the boot process. Consult your computer documentation for the meaning of the beep codes.
    The computer does not register 640 K of conventional memory. This can be a sign of a virus, but it is not conclusive. Some hardware drivers such as those for the monitor or SCSI card can use some of this memory. Consult with your computer manufacturer or hardware vendor to determine if this is the case.
    You have two antivirus programs installed and one of them reports a virus. While this could be a virus, it can also be caused by one antivirus program detect the other program's signatures in memory. For additional information, see Should you run more than one antivirus program at the same time?
    You are using Microsoft Word and Word warns you that a document contains a macro. This does not mean that the macro is a virus.
    You are not able to open a particular document. This is not necessarily an indication of a virus. Try opening another document or a backup of the document in question. If other documents open correctly, the document may be damaged.
    The label on a hard drive has changed. Every disk is allowed to have a label. You can assign a label to a disk by using the DOS Label command of from within Windows.
    When running ScanDisk, NAV Auto-Protect reports virus-like activity. The following are two possible solutions:
    Disable Auto-Protect
    1. Start NAV, and temporarily disable Auto-Protect
    2. Run ScanDisk and let it fix the errors.
    3. Re-enable Auto-Protect.
    Change a ScanDisk option
    1. Start ScanDisk and Choose to run a thorough scan.
    2. Click Options.
    3. Uncheck "Do not perform write testing."
    4. Run ScanDisk again.
    Also, if the computer is off, nothing can happen. No power = no movement = no activity = no file manipulations or movements

  3. #3
    Senior Member
    Join Date
    Jul 2002
    This link may help you on your first question about worms and give you a better understanding of them, hope it helps a bit. -Peace-

    The real question is not whether peace can be obtained, but whether or not mankind is mature enough for it...

  4. #4
    Join Date
    Jul 2002
    What you are talking about is a R.A.T. or "TROJAN". A worm is evil code that spreads quickly & can usually mail itself to peaple.

    However A trojan can have a payload of worms & viruses which can be launched like when the trojan &/or the zombie PC is no longer considered usefull.

  5. #5

  6. #6
    Junior Member
    Join Date
    Aug 2002

    Post WORMS: Write one, read many...

    [shadow][FONT=courier new][SIZE=1]In the hackers domain lore there are rules that should be considered, anyways these matters is all a part of our lives in the cyberspace...
    Do you get what I mean?
    I only remind you that VIRUSES[gloworange] are of the same type, whether they enter your system and have a view for it or even corrupt it, it is always a virus and "Don't trust a virus".
    All the time in the world many people get paranoia about these WORM and VIRUSES so why do you want to know about them?
    Maybe you want to write one
    Maybe it is your project at school
    or maybe it is something you're interested in...
    Maybe you're right!
    I'm interested about these topics but somehow people don't try to understand what the HELL are they gonna do wit dis "WORMS", they invented it so they can destroy other properties?
    Yet I'm not against those people;
    I am too on the lateral populace in the CYBERSPACE.
    So to speak.

  7. #7
    Senior Member
    Join Date
    Jul 2002
    Your thinking of a remote access tool (R.A.T). Stiller research has a great write up defining the differences between viruses and worms. http://www.stiller.com/vintro.htm

  8. #8
    Join Date
    Apr 2004
    think i got a solution for that! and not only that if u want to know about working of anything you can just visit the website:


    happy surfing

  9. #9
    Senior Member
    Join Date
    Jan 2002
    ummm, hey buddy. please stop resurrecting dead threads simply to spam that website address. you have done it in multiple threads many times this morning.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts