Skip to content

Commit

Permalink
Merge pull request tarcisio-marinho#7 from En1gma09/patch-1
Browse files Browse the repository at this point in the history
Update README.md
  • Loading branch information
tarcisio-marinho authored Oct 4, 2020
2 parents 1ba2626 + a938b8c commit a11630c
Showing 1 changed file with 12 additions and 12 deletions.
24 changes: 12 additions & 12 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

Original Repository of the GonnaCry Ransomware.

GonnaCry is a linux ransomware that encrypt all user files with strong encryption scheme.
GonnaCry is a linux ransomware that encrypts all the user files with a strong encryption scheme.

This project is OpenSource, feel free to use, study and/or send pull request.

Expand Down Expand Up @@ -42,23 +42,23 @@ https://www.youtube.com/watch?v=gSfa2L158Uw

# Disclaimer

This Ransomware musn't be used to harm/threat/hurt other person's computer.
This Ransomware mustn't be used to harm/threat/hurt other person's computer.

It's purpose is only to share knowledge and awareness about Malware/Cryptography/Operating Systems/Programming.
Its purpose is only to share knowledge and awareness about Malware/Cryptography/Operating Systems/Programming.

GonnaCry is a academic ransomware made for learning and awareness about security/cryptography.
GonnaCry is an academic ransomware made for learning and awareness about security/cryptography.

**Be aware running C/bin/GonnaCry or Python/GonnaCry/main.py Python/GonnaCry/bin/gonnacry in your computer, it may harm.**

-------------

# What's a Ransomware?

A ransomware is a form of malware that prevent legitimate users from accessing
A ransomware is a type of malware that prevents legitimate users from accessing
their device or data and asks for a payment in exchange for the stolen functionality.
They have been used for mass extortion in various forms, but the
most successful seem to be encrypting ransomware: most of the user data are
encrypted and the key can be retrieved with a payment to the attacker.
most successful one seems to be encrypting ransomware: most of the user data are
encrypted and the key can be obtained paying the attacker.
To be widely successful a ransomware must fulfill three properties:

**Property 1**: The hostile binary code must not contain any secret (e.g. deciphering
Expand All @@ -75,15 +75,15 @@ for other infected devices, in particular the key must not be shared among them.

# Objectives:

- [x] encrypt all user files with AES-256-CBC.
- [x] encrypts all user files with AES-256-CBC.
- [x] Random AES key and IV for each file.
- [x] Works even without internet connection.
- [x] Communication with the server to decrypt Client-private-key.
- [x] encrypt AES key with client-public-key RSA-2048.
- [x] encrypt client-private-key with RSA-2048 server-public-key.
- [x] Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
- [x] encrypts AES key with client-public-key RSA-2048.
- [x] encrypts client-private-key with RSA-2048 server-public-key.
- [x] Changes computer wallpaper -> Gnome, LXDE, KDE, XFCE.
- [x] Decryptor that communicate to server to send keys.
- [x] python webserver
- [x] Daemon
- [ ] Dropper
- [x] Kill databases
- [x] Kills databases

0 comments on commit a11630c

Please sign in to comment.