قالب وردپرس درنا توس
Home / Tips and Tricks / How to Infect with Malware?

How to Infect with Malware?

In the early days of personal computers, every user needed a lot of technical expertise. System does not start Open the case and replace all expansion cards, or polish the terminals with an eraser. During question time, ask for help with the PC User Group session. Try making some settings in the CONFIG.SYS file. Funny things! But this era is long gone. Modern computers usually work simply, which can be so boring. Here's an idea that can spice up your life – why not infect your computer with malware?

What if you turned on your computer and it triggered a warning that the FBI was investigating you? Or have you just opened your browser to put up a fun and colorful ad? Who knows, maybe your computer might be part of a zombie army called by a botherder to take down a big website! Would not that be cool?

If you want to open up to the full malware experience, you need to do some work. Modern operating systems and computers are just too damn nanny-state, and every new computer comes with a preinstalled security suite. Here are some tips to take you into this exciting world.

Choose the right device

Do you love your Mac? Your iPad Pro? Well, now you have to set it aside. There is no doubt that malware exists for macOS, but you might get old and gray when you wait for an attack. As for iOS, forget it! Anything that causes macOS problems when trying to get malware gets double for iOS.

What you need is a good old PC with Microsoft Windows. The older the Windows version, the better; Newer editions have some annoying built-in security features. If you find a box with the outdated Windows 95, that's gold! Microsoft discontinued support for this precious antique operating system in 2001

, and hackers had years to exploit it.

If you do not have a Windows device, you should opt for Android. That's what the malware writers do! Many Android devices are stuck with an old version of Android because the manufacturer does not support updates, including security updates. Lollipop, someone? Android fragmentation means that there are many vulnerable phones.

Evade Malware Protection

Of course, if you're trying to infect malware, you do not want malware protection. That would defeat the whole purpose! But do not wait, do not just delete your antivirus program. It's not that easy.

You see, Microsoft really wants to have antivirus protection. If Windows 10 detects that no other anti-virus programs are running, it automatically enables the Microsoft Windows Defender Security Center. In the past, that would not have been a problem, because Windows Defender was so lame. Unfortunately, the latest version shows better test results.

 Windows Defender in Action

You may think you could disable Windows Defender by turning on security settings and turning off real-time protection. However, Defender continues to run scheduled scans, so this is not a real solution. Yes, if you are a PC Assistant, you can edit the registry to secure a deployment to Windows Defender. Are you a magician? I would not have thought that.

Your best bet is to review our antivirus software reviews and choose a bad score. You can also try to keep the antivirus program active, but disable scheduled checks and real-time protection. Better yet, use an older version of Windows, one without any safety margins.

Tell the browser to shut down the computer

Modern browsers believe they know everything. Download it, but do not download it. This website is fine, but you can not go to this one. Throw away the tyranny of the browser! After all, you are the person responsible.

 Website blocked

Of course, the way you avoid escaping differs between browsers. In Chrome, click Settings on the menu, click Advanced, and then clear everything under Privacy and Security. If you are only part of Edge, select Settings from the menu, click Show advanced settings, scroll down, and disable Windows Defender SmartScreen.

Firefox users should click Options, select the Privacy and Security tab, and select the Block dangerous and fraudulent content check box. In the old school Internet Explorer, press Alt + T to bring up the Tools menu, select Windows Defender SmartScreen Filter, and disable this feature.

That was & # 39; s! You can freely browse on the Internet, not just the places your Killjoy browser allows. Take a look at dodgy links, colorful blogs, free help sites you can imagine.

At PCMag, we deliberately infect computers with malware to test security products, and we have our own methods of collecting malware samples. If you're impatient to start the malware party, there are plenty of resources available to the public, including the Contagio Malware Dump website and the KernelMode.info malware discussion forum.

Click on All Links!

OK You've fixed the obstacles to getting a malware infection. What now? Where is the malware?

First stop – your e-mail account. Skip the familiar emails of your boss and your Aunt Esther. Look for unusual news from unknown people. If you can not find it, check the junk mail folder. If you have found an offer to meet a Russian bride, or receive millions from your long-lost Nigerian cousin, click on the link to see what you want to show.

If the website indicates that you need to install a new video codec or driver or whatever, keep going! It could be a boring update, but could be some cool malware. If you do not see anything interesting, do not give up. Some malware works in the background. If you're lucky, you might see a fun screen like the one below. Do not worry; the FBI is not really after you. This malware just bluffs.

 How to Become Infected with Malware - FBI

Do not stop the links in your e-mail messages. If you see a funny ad while surfing the web, take a look! It may just be an unusual new product, but it could also be a hacker that infects PCs with malware.

Get Free Disk Space with Free Malware

You do not pay for USB thumb drives, right? I mean, people are giving them everywhere. Go to a seminar, you will receive the text on a USB stick. Your kids can thumb their homework from school. If you can visit the Black Hat pressroom or another security conference, you will find a variety of press releases on USB sticks. The boring safety gains do not absorb them, leaving it all the more for you.

You've heard the phrase, "See a penny, pick it up, you'll be lucky all day." Surely it is even happier to find a stick on the sidewalk or in the parking lot!

Most USB malware is so polite that it starts automatically when you connect the drive. If nothing starts, explore what's on your hard drive and see what interesting programs are waiting for you to activate them.

If you're using an older computer, you might expect a free fireworks display. Originally demonstrated at Black Hat, the USB killer is now marketed as a test tool. The USB power of your computer is used to charge the capacitors. Then the PC is charged with 200 volts. If the hardware is not properly buffered, the results can be exciting.

Do not be disappointed if the USB stick does not seem to contain anything interesting. It could be that you secretly take over your PC without any visible evidence. And last but not least, you got yourself a free thumb drive!

The Joy of Ransomware

Malware pretending to be wanted by the FBI is cool. Adware's flashing abundance of ads can be as entertaining as a kaleidoscope. Your heart will surely knock with a shiver of alarm and excitement when you find that a bank Trojan has cleared your account. But there is nothing that can be compared to an attack on ransomware, especially if you have disabled a boring ransomware protection that could make your PC cluttered "border =" 0 "class =" center "src = "https://assets.pcmag.com/media/images/597836-cerber-ransomware.png?thumb=y&width=980&height=416" />

Basic file encryption ransomware can be entertaining. After you have encrypted your documents, a colorful ransom note is typically displayed in a number of ways, some types change your entire desktop into a ransom note, others display the note in your browser or editor, and you can decide whether to use the ransom note. Want ransom on wardrobe and the dagger or you want to enjoy it without restarting the baggage of those old documents.

File encryption is fine, but for real excitement you want a whole Hard drive encryptors like the infamous Petya Ransomware. Seeing Petya in action is a gripping experience, like watching a spy movie.

First, a system crash is reported, and it looks exactly like the original. They wait in limbo while (presumably) creating the crash report. Then the system will be restarted. When you restart, you will see a plain text message indicating that CHKDSK is repairing the file system and that you could destroy all your data when you turn off the PC.

But surprise! This is not CHKDSK, but Petya. The file system is not repaired, but the entire hard disk is encrypted. When it's done, a red / white flashing skull image will show a colorful hint that you're having real trouble.

 When you tap a button, the skull changes to a bright (but not flashing) ransom. Unfortunately, this may be the end of your malware experiment, unless you choose the ransom and hope for the best. But you have surely come out with a bang! </p>
<h2>  Take the safe, boring path </h2>
<p>  What do you say? You <em> how </em> if you use your computer is boring? You do not want to experience the excitement of inviting malware into your life? Well, you miss you. However, you can still use something from this article. Just follow all the steps and suggestions, but do the opposite – you might even want to use a VPN, Normie. </p>
<script async src=
Source link