Browse Source

docs(malware): fix typos

language reveiw to follow
pull/1929/head
davhojt 1 year ago
parent
commit
d9b0e61192
No known key found for this signature in database
GPG Key ID: 29BFE853DB7E0677
  1. 6
      subjects/cybersecurity/malware/README.md

6
subjects/cybersecurity/malware/README.md

@ -7,7 +7,7 @@ Its time to thing like black hat to understand how the ransomware work like (Wan
### Guidelines
You need to develop a ransomware that encrypt all the files with your extension and add a text file in the desktop with "All of your files have been encrypted,To unlock them contact me with your encrption code in this email@email.com, your encrption code is : {xxxxxxxxxxxxxxx}".
You need to develop a ransomware that encrypt all the files with your extension and add a text file in the desktop with "All of your files have been encrypted,To unlock them contact me with your encryption code in this email@email.com, your encryption code is : {xxxxxxxxxxxxxxx}".
a random encryption code must be placed in the text file, you must use this encryption code to provide an decrypting program.
a decryption program is generated for each victim using the number generated after the encrypting (the encryption code).
@ -20,9 +20,7 @@ You are free to choose the programming language for your programs.
### Advice
> Avoid developing this malware in your own operating system or you will cry lonely in the corner!
> This program is for educational use only, Do not use it for evil purposes, If you do this, we will not visit you in prison!
> Avoid running this malware on your own machine at all costs, or you may find yourself in a world of encryption pain.
https://docs.microsoft.com/en-us/windows/win32/api/bcrypt/
https://docs.microsoft.com/en-us/windows/win32/fileio/file-management-functions

Loading…
Cancel
Save