Latest: Hack Facebook Password! | Wants To Hack CellPhone | Trace Mobile Number(only US) ! | New : Best FUD Keylogger!

Featured Posts

hack mobile

Thursday, June 24, 2010

Hex files : How to make trojan virus undetectable by hex editor

Posted by wildrank on Thursday, June 24, 2010
I have been talking about FUD keyloggers and trojan virus throughout in my articles. I have even told you how to create keyloggers and trojans to hack victim email passwords. Today, I am writing about new concept to Hex files popularly called Hexing. By using Hexing, it is possible to
make our created trojan virus undetectable by antivirus.



What is this - Hex files???

Hex (Hexadecimal) is the way of representing data. In computer science, hexadecimal means base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF.

Hexing is the the process of modifying application files using Hex editors (softwares used to edit files in hex format).


How Antivirus works???

First of all, lets know how antivirus flag any file as virus.

Antivirus works in a pretty complex way. To summarize its working in short, antivirus has virus definitions (also called signatures) stored in its database. While scanning a file, Antivirus searches for these virus definitions or signatures in a file and if it finds these signatures in a file, it flags these files as virus.


Hexing to make Trojan virus undetectable:

Now, when you know all the basics, its time to know what you have to do to make virus undetectable.

When you have created the virus file, simply open the virus trojan file in Hex editor and search for signature which Antivirus has flagged as virus definition. We have to change this signature such that it will not affect the working of our trojan virus.

There are many techniques used to search for virus signature in file and even change these signatures. You can do this manually or even by using software. Once you have successfully changed this signature, antivirus will not detect your trojan virus, thus making this virus trojan FUD.

Update: For detailed step-by-step tutorial on Hexing refer my article How to perform Hexing using Dsplit. I guess it will help you.

I will be writing more on various Hex editors and how to use them to make trojan virus undetectable. I hope this article helped you to get the basics of Hexing to make trojan virus undetectable. If you have any problem in
Hex files to make trojan virus undetectable,
please mention it in comments section.

Enjoy Hexing to make trojan virus FUD undetectable...

If you enjoyed this post and wish to be informed whenever a new post is published, then make sure you subscribe to my regular Email Updates. Subscribe Now!



Do you need to know what your child is doing on the computer? Do you want to know what your loved ones or spouse or kids are doing on the computer? Do you need to monitor what your employees are doing during work hours? Are they working or playing?

Winspy Keylogger is intended to help you in these kind of situations. It can show you exactly what is being done on the computer at any time.

Click Here To Download Winspy Keylogger
 
  • Gmail Hacking

    Wants to hack Gmail a/c password ? Learn best way to hack Gmail password..

  • Jailbreak Iphone/iPad

    Jailbreak your Iphone or iPad to give it more functionality free of cost...

  • Facebook Hacking

    Wants to hack Facebook password? But Don't Know Where to Start? Learn here......

  • MAC Keylogger

    Learn how to hack emails account password on MAC OS using keylogger....

  • Mobile Hacking

    Monitor mobiles,Records the activities of anyone who uses iPhone, BlackBerry....

Disclaimer

ALL INFORMATION / TUTORIALS WRITTEN ON WILDHACKER.COM ARE FOR EDUCATIONAL PURPOSES ONLY, THE SITE WILDHACKER.COM IS NOT RESPONSIBLE IN ANY WAY FOR HOW THIS INFORMATION IS USED, YOU USE IT AT YOUR OWN RISK. YOU MAY LEARN ALSO HOW TO GET YOUR OWN ACCOUNT BACK FROM ALL THIS INFRORMATION.

Recipes

Unlock Iphone Website Hacking

Facebook Hacking Keylogger

Unlock Blackberry Unlock Modem

Gmail Hacking Hack Yahoo

Hotmail Hacking Remote Hacking

Blog Archive

Traffic / Ranking

Powered by:

Wild Hacker © 2012. All Rights Reserved | Contact | Bloggers.com