Programming the ability of Brontok

Brontok manufacturer has the ability programming is low enough (will not be passed on the course where I became the FY-it). Some of ignorance that made the manufacturer Brontok:

1. Errors in the code, for example, forget the variables that are accumulated in the loop.
2. Doing odd, for instance, read the entire contents of a file to retrieve only the line suddenly.
3. Is not consistent in the type of hell.
4. Not too understand the pass by value or by reference, often copying the parameter to the local variables to be processed.
5. Not too understand the Win32 API, so that the patchwork, sometimes called external programs, sometimes using the Windows API.

Chance manufacturer Brontok this much copying and pasting code from the Internet, so that the results of bad code.

In addition, it looks like the ability to speak English is not good brontok manufacturer, so it only can write a message in the language morale even though the domain has been detected among the local foreign domain.

The only advantages that are owned by the Brontok is ketekunannya to always update brontok each time found a way to remove himself.
Conclusion



Creator Brontok is not likely ITB students Technical Information (but may be from ITB), their ability is low enough, people may be Java / East (many from the use of string in the Java language, this is not menyudutkan tribe, my people are also central Java). Further investigation may find the right who make Brontok. Creator Brontok can only enter Brontok first to the ITB, because of access WIFI some point, which is open at the ITB. Several other universities, such as UNJ also have WIFI access point and the open public.

Creator Brontok is enough "good" as local viruses delete the other, but rather how penghapusannya "brutal" and delete files you may be valuable. Examples of the case such as this: some people like to create self-Extracting zip file, a zip file that was changed to exe programs that do not need WinZip or for such untarred, this is usually sent to colleagues who have older versions of Windows and may not have a Zip Extractor (Windows new mengekstraksi can zip files automatically). EXE file is extremely vulnerable erased by Brontok if the name contains certain substring. Perhaps only 1 in 10,000 people who have cases like this, but it means Brontok damage for one man. "Then the hearts" Brontok manufacturer to remove other viruses is likely only to be done to make menaik popularity among the creators of viruses, and such promise, he wants other local manufacturer virus "sprawl".

Is antivirus software manufacturer involved in this case? I can not give certain answers. Brontok initial version is easy to understand and demolished (so there is a possibility they hide the facts about the URL update Brontok), but the next version Brontok already complex enough, and there is a possibility they do not understand the encryption algorithms Brontok.

If not stopped, the manufacturer may brontok this will create a worm / virus more dangerous for the show kehebatannya kebodohannya. It seems to this creator of the virus still feel safe-safe because it does not feel any instructions that led to it.
Advice for the virus maker wannabes

First, for those who have never created a virus and is often condemn the virus creator, you need to know: Making the virus is sometimes enjoyable and educational. I once (1999) to create a virus that I am not as (I save the situation and not be encrypted, so it may not accidentally run, the virus also virusnya DOS, it will not be any menginfeksi now). Creation of a virus that has taught me things that are not taught the lessons algorithm and Programming, Computer Architecture, Operating System, and Otomata (my virus is written in assembly and polymorphic, so there is a formal theory as well).

My advice to the virus or virus creator of the candidates:

1. Do not create viruses that damage.
2. Do not you as a virus (be sure to make this code so that the virus does not run on computers other than your computer)
3. Do not just make a virus that stupid, eksplorasilah techniques such as advanced stealth techniques, polymorhic, etc..
4. You write the results of exploration, a U.S. magazine virus (electronic version of the magazine, check out the magazine 29A of the virus only exploring the techniques of viruses, but do not make the virus spread, they can make the virus a thousand times more powerful than the Brontok).
5. Pipe talent and your ability to other things.

Think about this: you think it is great to create viruses that spread and damage. Examples of things that are great in the student toki (Tim Computer Olympics) to fight with the nation they create programs that solve complex problems.

Another example is great if you explore the creation of a virus, does not disseminate, and you generate a better antivirus virus to others.
Advice for hacker wannabes

Being a white hat takes time, and not the result of a short training or certification, so you are really interested in the security, study diligently and with care. If you understand something less, Please do not make the analysis exotic that they can be misleading or community.

Sample analysis is misleading: he said the virus does not send itself to a domain server, for example, are now receiving the file and believe it is not a virus because the domain is. Ac.id, then that person can be infected. Sample analysis that they are that the virus only because of the ITB 17:08 WIB hour schedule, which means that the restriction on the internet ITB has been revoked on the clock (start precisely 17:00), but there is not a view that 17:08 may be selected as the day symbolizing the proclamation? .



Indonesian
»
English
Translate


0 komentar: