§+++++++++++++++++++++++++++++++++++++++++++++++§ ]|[ [-=- SOLDIERX.COM Presents -=-] ]|[ +++++++++++++++§+++_________________________________________+++§+++++++++++++++ \\//////////////// THEORY BEHIND EVOLUTIONARY PROGRAMMING \\\\\\\\\\\\\\\\// \\\\\\\\\\\\\\\\\_________________________________________///////////////// \\::::::::::::::::::::::::::::::::::by:::::::::::::::::::::::::::::::::// \\xxxxxxxxxxxxxxxxxxxxxxxx§-=-][- Hare -][-=-§xxxxxxxxxxxxxxxxxxxxxxx// \\:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::// \\=====--------------------FEBRUARY 2001--------------------=====// \\ SOLDIERX.COM // \\ NOBODY CAN STOP INFORMATION INSEMINATION // §=+++++++++++++++++++++++++++++++++++++++++++++++++++++++++=§ ************************************************************* * This document was submitted by a non-soldierx crew member.* * Therefor we do not guarantee that everything in this * * document is safe or accurate. Use with precaution. * * Writer's E-mail: hairy_hare@hotmail.com * ************************************************************* Theory Behind Evolutionary Programming v0.7 By Hare Theory Behind AI (v0.6) What is the theory behind AI? Computers are the human attempt to recreate the human brain, AI is the attempt to make computers sentient. AI is difficult to put into programming code, since it is such a complicated concept. Many people believe (myself included) that at this time it is impossible for a human to create an AI program from scratch. So how do we create AI, we use evolutionary programming (from now on I will refer to it as EP). Self Replicating Programs (v0.1) Self Replicating Programs (often known as virii) are the first step towards EP. So you ask, "If virii are the first step toward EP, then can the principals in this text be put to work on developing complex coputer virii?", ding ding ding, cogratulations, you won a brand new brain, manufactured by the dumbasses at Microsoft. So you now see what this bloody text has to do with hacking, much more to do with hacking than some of the other hacking shit I read. Putting EP Into a Program (v0.2) How do you do EP? Well to make it possible for a program to use EP, it must have two parts EP code (EPC) and the program. Since EPC does not currently exist, it must be invented in order to be used. To invent this code we must go back to the base 2 numbering system. We use sets of 2 numbers, so there are 4 possibilities, yet only 2 outcomes. Why do we use sets of 2 bits when a single bit will work just as well? (v0.1) Well dumbass, it appears that Microsoft fucked up again, your brain's working about as well as Windows. With sexual reproduction it is necessary to use dominate and recessive genes, without them it would be random, and evolution would not work. I will use 1 as dominate, and 0 as recessive (ie if you have 00 it will give you the recessive trait, but 01, 10, and 11 will all give you the dominate trait). I will now explain why I use 2 bits, you cannot have dominent and recessive without. Below is an example of a program, I forgot why I broke it into sections of 4 bits. I broke it into sections of 16 bits because it's easier to view. 00 10 11 10 01 11 00 01 10 11 01 10 10 10 01 10 10 10 10 10 11 01 10 11 10 00 01 10 10 10 10 10 01 01 01 01 00 The Brains of the Operation (v0.6) Each two bits stands for a value (ie if you were making a worm, you might use one to describe what kind of server it would hack, so if one were caught, the others would not be discovered.) The EPC is used as an index, each piece of code has a value that refers to a two bit section of the EPC. Simple, isn't it (v0.6) You may reallize by now that the way I have written it here is incredibly simple, I did that so newbies could tell exactly what I'm talking about. This scale of an operation will not give you a possibillity of AI. The main purpose is to hide virii and worms from detection, but you can easily use it to other puposes. Contradictions (v0.6) It is a good idea to not put contradictions into your programming. A worm cannot attack a Linux server if it's programmed to use exploites in Windows 2000 servers. Disadvantages (v0.7) These files need a way to find each other, a potential disadvantage. I will not solve this for you, I do not have a solution. This is a problem, but read on and I'll tell you a way you may be able to bypass this. Saving Space (v0.6) Saving space is essential for any web based program, so here you go. You can save space by excluding the non-indexed code. What that means: if it is 00, exclude code for 11, and vise versa. You can also compress code that is ressesive if a dominant gene is present. Encrypted Virii (v0.7) It is a smart programmer who uses encryption on his virus program. I suggest using a seperate encryption routine for those pieces of code that are not used, yet still need to be included. Polymorphic Virii (v0.7) Smarter programmers use polymorphic virii. I looooooooooove these guys, they are so intellegent. I suggest the same thing for these guys as I do for encrypted virii. Metamorphosis (v0.7) Yeah, you heard me, metamorphosis. This is an idea I had in v0.7, it involves the scrambling of the EPC with every reproduction. This has advantages and disadvantages. On the good side it allows for asexual reproduction (does not need a partner), this makes for faster reproduction. On the bad side, the virii are easily linked, and it cannot exclude information that is not used. On the good side, if it is polymorphic, it's bad-ass. Example (v0.7) Did you hear about the Ramen worm? Yeah, good. The Ramen worm, released by the RameN crew, is a worm programmed to attack RedHat v6.2 and v7.0. Well this worm uses exploits that are comonly known, wu-ftpd and rpc.statd on v6.2, and LPRng on v7.0. If it had been broken into two, they might think it was not the same worm. How would this be done? Look below. The EPC would be very simple: 10 What, only 2 bits? Yep. After it reproduces it will make programs that use recessive genes. 00: Attacks v7.0, puts up a web page saying "Clurox, nothing cleans web pages better!" (yes, I know it's dumb) 01, 11, or 10: Attacks v6.2, puts up a web page saying "Hackers looooooooooooove noodles," (origonal message) This simple modification would allow for the two to be considered seperate, providing it was programmed with care. Ending (v0.7) The way that these programs work may be seen as destructive to networks, using large amounts of space, and have a possibility of entirely taking over some servers. For a programmer to use one of these is a possible freeing of the net, or the possible destroying of it. Okay, I admit it, this form of programming is likely going to be seen as destructive, and just a form of virii, well fuck them. If you have read this, and you use it, I would appreciate credit. For this version, this is the end. I am not a hacker, or a script kiddie, although many years ago I almost became one. I am a college student majoring in Computer Programming, but just in case anyone decides to theorize about my involvement in certain acts, I will be known as Hare. This is the first time I have been known as Hare (01/08/01), do not confuse me with any other person that may be known as Hare, I do not know if I am the only one. As a final note I would like to thank all the hackers who chose to wage war on the monopoly that is Microsoft, or the monopoly that is AOL Time Warner. Fuck the Tortoise, Hare P.S. If you have any ideas to improve this file, contact me at hairy_hare@hotmail.com. I would also appreciate any virii or worm texts you have, as well as AI texts, pdf's are nice too. If you chose to copy this file, please do not modify it in any way, otherwise you may quote it. _____________________________________________________________________ §=------------------------------]-§-[------------------------------=§ \\ THIS FILE WAS A SOLDIERX PRODUCTION // \\ http://www.soldierx.com // \\ NOBODY CAN STOP INFORMATION INSEMINATION // §=+++++++++++++++++++++++++++++++++++++++++++++++++++++++++=§