You’ve finally decided you’re going to develop your own VB6 crypter. The only problem is, you don’t know where to start.
What’s a crypter you ask, hacker newbie? Simple enough; a crypter protects software from things like antivirus and reverse engineering. Mostly, their made for bypassing antivirus software.
An FUD crypter, then is a crypter that is Fully Undetectable (FUD).
This method will work if you are on a Windows PC. If you are a Mac user, you will have to boot windows from your Mac. I’m not going to get into that here, there are guides all over the internet for that anyways, Google is your friend. Anyways, if you’re into hacking, my guess is that you’re probably on a PC anyway. Sorry, Apple guy. The truth hurts sometimes.
Let’s get down to business. We’ve got a lot to cover!
Part 1: Getting VB6 (Windows Visual Basic 6)
We’re not going to go too deep into downloading & installing visual basic. Just do a Google search VB6 or visit “Visual basic 6 here” and download/setup the program. If you have problems feel free to comment, but I have a feeling if you can’t get past this, you’re going to have a really hard time with the rest of this article. Go get Windows Visual Basic!
We have to be a little up front here, if you’ve never tried programming in your life, this is probably not the best place to start. There are a million websites out there to teach you fundamentals of programming; we’re not that site. Development basics can be found at http://codeacademy.com.
Part 2: Creating your Crypter in VB6
STEP 1: Go ahead and crank up VB6 and let’s get started. First we’re going to want to open a new project.
Start with the option “Windows Forms”. This will open a project page that looks like this:
Step 2: Select Form 1. In the Form1 column, scroll down to “text” and enter a new name for your crypter. This will change the title at the top of the window.
Step 3: From the left, grab a textbox. Drag it across the top of your new program box.
Step 4: Make 3 buttons. Your crypter should now look like this:
Step 5: Change the text of each button to “Crypt”, “encrypt”, and “Clear” respectively
Step 6: Click where it says label, and change it to a new name for your crypter.
Step 7: Open your crypter source code file that you found in our previous tutorial in the MS Word document. Copy the text as plain text, and paste it into your source code tab.
Make sure that you copy all of the source code, or your crypter will not function correctly in vb6. You need separate source code for each button. That is to say, you will copy and paste 3 different source codes. One for “Crypt”, one for “Clear”, and one for “Encrypt”. This is all included in the MS Word document mentioned above.
Step 8: We can touch things up by changing the icon to a key. Feel free to use this key and scroll down on the right to find the “icon” setting. Upload an image, like this one:
Step 9: Save your work. Hit F5 or click the green arrow so that we can check debugging. A new screen will open. Go ahead and type something- anything- and hit “crypt”. Keep hitting crypt.
You should see foreign looking characters changing over and over again. Now, hit encrypt, and what do you see? Your original word.
Pretty interesting right? So that’s how the crypter works. It’s dead simple, you just have to have some good source code to work with. Writing that source code yourself is where it will get a little more difficult, and obviously much more advanced.
Step 10: You thought we were done? No not yet. Go ahead and go to the “Project” tab and hit the second-to-last button, which is whatever you named your file. A big page will pop up. Hit icon again and change that file to whatever you like.
That’s it! now your ready to get started
Let’s talk about writing your own source code. If you want a powerful and flexible crypter, your going to want to use C or C++ programming language. If you’ve never written a program before, again, don’t start here. But if you’re a regular hacker, let’s get this cranking.
To be certain, your source code must fit all of the following:
- There cannot be any relocations for “.text” section in the code
- “.text” must be the encrypted section
- Make sure to leave space at the end of the section for the file stub
- NO transparency allowed in the RVA, otherwise you are asking for a malfunction. An example might be: raw size of 5,000 with a virtual size of 10,000.
You’ll have to screw around with it quite a bit before you have yourself a functioning crypter. One way to learn is to modify someone else’s code instead of starting from scratch. This will give you a working crypter and help you nderstand the basics.
Alternatively, just buy a FUD crypter like CypherX http://cypherx.org/buy-crypter. You’ll save yourself a lot of time, and you’ll have a professional-level crypter at your disposal. If you want to start from nothing and build a crypter with your own source code, you can count on spending endless amounts of hours on getting it right. It’s just not going to happen overnight.
The bright side is, once you do have your own crypter up and running, there is no stopping what you can do with it. An uncrackable, encrypted code that only you have access to is what hacking is all about.
FUD Crypters, when use correctly, are great for hacking. VB6 for windows gives us a great way to create these works of art that can serve us in many ways as we venture into the cyber world of hacking.