The Crypt Er Blueprint Free
The Crypt Er Blueprint Free
How to Create Your own FUD Crypter [The Right Way] ...In Less Than a Week
Brought to you by, http://crypters.net Version 1.00 July, 2010 Limits of Liability & Disclaimer of Warranty
I AM NOT AN ATTORNEY. DO NOT USE THE FOLLOWING TEXT UNLESS YOU HAVE YOUR OWN ATTORNEY REVIEW IT FIRST.
The author and publisher of this eBooks and the associated materials have used their best efforts in preparing this material. The author and publisher make no representations or warranties with respect to the accuracy, applicability, fitness, or completeness of the contents of this material. They disclaim any warranties expressed or implied, merchantability, or fitness for any particular purpose. The author and publisher shall in no event be held liable for any loss or other damages, including but not limited to special, incidental, consequential, or other damages. If you have any doubts about anything, the advice of a competent professional should be sought. This material contains elements protected under International and Federal Copyright laws and treaties. Any unauthorized reprint or use of this material is prohibited.
Little bit about me: My name is Shawn and I have been working with crypters for years. I am also the owner of http://crypters.net and http://cypherxorg. It is rare to find quality information about crypters on the web thats why my goal with this ebook is to finally provide quality information about crypters all in one place. Feel free to contact me by emailing: [email protected]
Introduction
First I just want to give major credits to all the links to threads used in this eBooks. Massive credits to all the forum members that made them, thank you.
What is a USG?
A USG is part of a crypter that generates a unique version of the stub (stub is part of crypter used to encrypt and decrypt the specified file). The purpose of this is because FUD crypters dont last forever, eventually crypters become detected over a period of time. You will understand this better later on in the eBooks. (The USG is to the right and above it is the Crypter)(But this is probably one of the most advanced USGs you will find, some can be very simple)
Types and forms of Crypters Crypters can range in many types and forms and it is important to understand these types and forms because it will help you choose a crypter more suitable for you. Here are some simple and advanced crypters to give you a good idea, or picture in your head.
It is even difficult to find a crypter with which you can purchase that will stay undetected (FUD) because the majority of all other crypters are typically being sold by hackers, these crypters are: Unreliable in various ways including lack of code protection and integrity. Not suitable for professional use cases Only updated to stay undetectable for a temporary period of time. Etc.
That is why if you are interested in obtaining an FUD crypter, You must either create your own which is highly unlikely. This will take even more time depending on your programming knowledge. It is a very difficult and long learning process to properly mitigate antivirus software and to manage against constant antivirus updates. Or purchase one that is professionally managed and suits your needs. (Continue reading)
www.virustotal.com/ And there are also individual antivirus scanners, for example: http://www.kaspersky.com/scanforvirus http://www.bitdefender.com/scanner/online/free.html
2. The Second factor is The second factor that causes antivirus detection is from the antiviruses themselves. This factor is often overlooked. T his is essential information that everyone must know when using or making Crypters. Most of the time, the antivirus will automatically send detected files to their labs when any certain file becomes detected. Antivirus also owners have the option to send off a file to the vendor with a click of a button through their desktop antivirus.
What can you do about this? well you can change the settings on your antivirus. The setting usually comes in slightly different forms, sometimes you are also asked during setup, and sometimes you just have to go into the settings or options manually, for
example:
Kaspersky
1.--y
Application Control Firewall Proactive Defense Network Attack Blocker Anti-Spam Anti-Banner
No marcar!
LA
Parental Control Ct, Scan My Computer I. a Full Scan ll Q u ic k Sc an Objects Scan 1 Vulnerability Scan My Update Center 0 O ptions F--.0 Threats and exclusions
1.-.4
1....n Appearance
Help Restore
Gaming profile
OK
C lose
DNAScan
Suspicious Files Help
M arc ar est a!
a:A:Updates
0 Automatic Update 0 Messenger 0 Internet Settings E
0 Miscellaneous
xciusion 0 General
Default All
OK
Cancel
Default
All of what you just read is essential to keep in mind when making an FUD Crypter. The sole reason behind why public Crypters always become detected ..and usually fast, is because the majority of people do not know the antivirus vs. Crypter concept.. therefore they either blindly upload there crypted files to one of the scanner sites that distribute also.. the antiviruses themselves are uploading there crypted files without them even noticing. Even people who make their own Crypters arent aware of this which is why they are always wondering why there crypted files always become detected so fast.
Anti-viruss have databases of these lines that are known to be associated with malicious files. They use that database to check against your file to see if it matches. If it does, then it is marked as infected. They do use other methods of detection, but this is the one you will learn how to avoid.
Your crypter is going to take the contents of an infected file, encrypt them, and place it at the bottom of a seemingly virus-free file called your stub. Your stub file will then extracts the encrypted data from itself, decrypt it, then extract and run it. So just imagine if this stub file that is joined together with the cryped infected file is detected? well.. then all the files you crypt will also show up as detected since this stub is used with all the crypted files. This may sound like a complicated and confusing process, but it isnt and I will explain more about it later on
Heres another pic I found, (credits to hack hound) this explains all this in a slightly different way, maybe you will understand it better:
Copyright 2005-2012 Crypters.net - All Rights Reserved.
Stub
Encrypted file
The Stub The stub is the core of the program. It is the stub's mission to carry out file decryption in memory and file execution or other custom options a programmer has given the crypter. programmers often spent a lot of time trying to reduce the size of the stub in order to reduce the file size of the outputted file (stub + encrypted file). This could also help the presenece of the stub go unnoticed if their is only a few bytes diffence from the original inputted file and the outputted file. (inputted file outputted file) = stub size. This trend has stuck and it is now common practise to try to make the stub as small as possible. There is a myth that some people tend to fall into the trap the the smaller the size of a programmers stub the better the programmer, but this is not always the case. A stub should be judged on functionality as well as Stability and security. Once executed
Stub
Encrypted file
Stub
Decrypted File
Stub
Encrypted file
You have just reached the end of this free version of The Crypter BluePrint guide.
Or get yourself a copy of the #1 Crypter, used in over 50 countries worldwide: http://cypherx.org