A question about c++ code and what to use

This is a discussion on A question about c++ code and what to use within the C++ Programming forums, part of the General Programming Boards category; Hi im not an expert in c++,so please bare with me here. Ive been doing c++ for about 1 yr ...

  1. #1
    Registered User
    Join Date
    Feb 2010
    Posts
    4

    A question about c++ code and what to use

    Hi im not an expert in c++,so please bare with me here.

    Ive been doing c++ for about 1 yr now so i think ive mastered the basics and beyond. Ive been teaching myself through books and discovered this site which is full of useful info.

    Now to my question. I was talking to one of my friends who is a more experienced c++ coder and we got into a conversation about hiding a program behind another.

    So lets say ive got this modified version of a program. How would i hide this program behind the original so the modified one executes it modifications without behind detected. Mabye every time a scan goes out to make sure everything is original, the modified program hides behind the original therefor being undetected but still running modified code. Would i make a seperate program to loop the detection of the scan then if that happens then hide it behind the original without executing its untouched code, also how would i make it exactly hide, would i move the program, or would it just stop for a moment while the scan goes through?

    I know this is quite advanced but with experienced coders like you all around, im sure you guys could help me out ( starting small of course )
    ** Note just playing around with c++, this topic just seemed to grab my attention

    Very much apreciated,
    -hunter

  2. #2
    Guest Sebastiani's Avatar
    Join Date
    Aug 2001
    Location
    Waterloo, Texas
    Posts
    5,708
    That just isn't going to work on most modern operating systems (fortunately). My advice to you is to stop trying to be a cracker and focus your energies on more ethical exercises. Also, keep in mind that this forum limits the scope of such discussions...
    Last edited by Sebastiani; 02-19-2010 at 02:36 PM.

  3. #3
    Registered User
    Join Date
    Oct 2006
    Location
    Canada
    Posts
    1,243
    This is a more advanced topic, so you may not want to tackle it right now. It's certainly advanced for me. I say this because I have no clue where to even start with attacking the task. I have no experience in this because I've never needed anything similar to such a task. Therefore, since in all of my experience I have never needed or used such a thing, it's not at all useful (to me).

    Also, are you asking how to write a trojan horse or other malicious software? If so, I imagine you won't get any help.

  4. #4
    Registered User
    Join Date
    Feb 2010
    Posts
    4
    forgive me if i seem to be a cracker or malicious software creator, but im really not nor would i ever want to be. My job would fit more into ethical hacking, or being curious. I would just like to see how this would work, and to further protect my system.

    sorry for seeming to be a bad guy

    -hunter

  5. #5
    a_capitalist_story
    Join Date
    Dec 2007
    Posts
    2,657
    Sounds like a scumbag script kiddie to me. Nobody reputable is going to help you hurt people.

  6. #6
    Guest Sebastiani's Avatar
    Join Date
    Aug 2001
    Location
    Waterloo, Texas
    Posts
    5,708
    Quote Originally Posted by hunterx1x View Post
    forgive me if i seem to be a cracker or malicious software creator, but im really not nor would i ever want to be. My job would fit more into ethical hacking, or being curious. I would just like to see how this would work, and to further protect my system.

    sorry for seeming to be a bad guy

    -hunter
    Well, I can't speak for other OS's, but knowing a fair bit about the internals of Windows, I can tell you that from Win2000 onwards the only way that could be achieved would be a total compromise of the operating system, which isn't easy to do in the first place, and it's only getting harder with each new release. In other words, you're really just wasting your time.

  7. #7
    Registered User
    Join Date
    Feb 2010
    Posts
    4
    Alright thanks. So it seems like i rlly shouldnt worry about people doing that or detecting that?

  8. #8
    Registered User
    Join Date
    Oct 2006
    Location
    Canada
    Posts
    1,243
    hunter, your intentions may (or may not) simply be curiosity, but, again, I dont think anyone here will give you any useful input in either case. I imagine the majority of people on here would have trouble writing such a thing, too. I think this is true because if they did know how, they'd probably be on a more "underground" or cracker-oriented forum, opposed to a useful and constructive forum like this one.

    You say you want to know how to do this, in order to "protect your system", but I dont think any of this knowledge can be used for any sort of protection.

  9. #9
    Registered User
    Join Date
    Oct 2006
    Location
    Canada
    Posts
    1,243
    Quote Originally Posted by hunterx1x View Post
    So it seems like i rlly shouldnt worry about people doing that or detecting that?
    Its probably best left to anti-virus and related software companies. This is a very broad and involved area of research and practice, and to understand it in any way useful would take a lot of reading and experimenting, I imagine. If you're actually just worried about someone doing this to you, then just install relevant software to try to detect and prevent such things from happening. Of course its always good to be curious, though.

  10. #10
    Registered User
    Join Date
    Feb 2010
    Posts
    4
    Alright sounds good, also your right if i wanted to hurt someone why would i ask how to here?

  11. #11
    Guest Sebastiani's Avatar
    Join Date
    Aug 2001
    Location
    Waterloo, Texas
    Posts
    5,708
    Quote Originally Posted by hunterx1x View Post
    Alright thanks. So it seems like i rlly shouldnt worry about people doing that or detecting that?
    Security auditing is not the stuff for inexperienced programmers, to be sure. Most ethical hackers have many many years of experience, and are required to have a really deep understanding of how the entire system works. If you're concerned about your system, then I'd suggest a reputable anti-virus software. Trying to do it yourself is just asking for trouble.

Popular pages Recent additions subscribe to a feed

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21