Question:
is there is a way to forcibly put files on other computers?
Dragonpowerful
2009-04-09 20:41:51 UTC
my computer teacher said we could make a fake virus at school, and I want to know if there is a way to forcibly put files on other computers on the same network with out them being notified.
Five answers:
Dennis C
2009-04-09 21:16:38 UTC
Certainly there is probably a way to accomplish anything on a network of computers, but I think "depositing" a file on to a computer is NOT the same as making it the target of a computer virus.



The teacher has presented you with a "research challenge" and the ultimate goal of this may be to force you into doing a little homework!



Virii usually require the passive acceptance of a person by being "granted" access to a computer by means of the authorized user downloading them, as an e-mail attachment, or introducing them to the computer by means of physical media (CD-R/W, Flash Drive, Thumb Drive or Portable USB hard drive). We still call this second method of physically transporting a file to a computer as using, "SneakerNet" (walk over and put in disk).



Forcibly injecting a "dead" file onto a computer is more like "payload delivery" or a file "push" (as in a MS Windows/WSUS update or other types of boot-time scripted event).



Virii usually take advantage of the access they WERE granted on the computer to send outbound communications on a specific "port" and request data to be downloaded along the "data path" leading back to that same port. However, modern computers with either a software-based firewall (program), hardware-based firewall (firewall equipped router) or BOTH are going to be difficult to penetrate!



If you think of the computer as a "Tool" then the idea of using a Screw to twist a Screw Driver applies. It is sort-of a "reverse scenario" because computers are really designed to DO the browsing of a netwrok, not to be "forced" to receive data which they did not initiate the request to GET. In HTTP the "GET" procedure is a command-type thing working behind the scenes to request data from remote servers.



HTTP data traffic comes and goes on Port 80.

E-mail on Ports 25 and 110.



Most computers these days, especially Microsoft Windows XP with Service Pack 2 (SP2) or SP3 are going to appear to be fairly well "hardened" against unauthorized data pushes. Of course this is where the idea of security flaws or "exploits" get introduced - - weaknesses in the Operating System (O.S.) that individuals with computer programming skills have way of identifying and taking advantage of (i.e. forcibly exploiting). The problem with these exploits is there are organizations out there in competition with each other to professionally identify, report, receive "credit" for and (even) make money by pointing out to the software's authors before the other guy. So almost as quickly as they are identified, they may be "knocked down" or closed by means of a "Patch" (or Service Pack) being released by the software's authors.



I hope this information helps. I hope it is as good as whatever you may find on Wikipedia.org, just less wordy, and that it is of some use.



More than that I am not prepared to write about at this time. Best wishes for your research!
MKultra
2009-04-09 20:54:05 UTC
Computers do not notify the addition of a malicious file to the owner - that's what AV programs are for before it get's written to disk..



You can simply map a drive to the admin share or disk of a PC on your own network if you have admin rights....
2009-04-09 20:45:02 UTC
If its a virus, they will most likely be caught, but anyone can place a file on a pc on the network.
lipps
2016-10-25 06:44:39 UTC
sounds like some living house windows archives are corrupted. once you launch the startup restoration, fairly of attempting to fix the living house windows startup, attempt to revive living house windows to an early factor and be conscious if that permits. If that doesn't artwork, than you may ought to reinstall living house windows making use of a dvd, or connect your computer hardcontinual to a pc, lower back up your archives, position the hardcontinual lower back lower back and press F11 or F12 to make a production facility restoration.
advocatefreedom
2009-04-09 20:49:05 UTC
If you're a domain administrator, and all the machines don't have a firewall or the firewall is not switched on, you can do it either through domain policies, or using the the login script.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...