Revision as of 00:13, 19 August 2012 editMythpage88 (talk | contribs)1,654 editsm Added {{no footnotes}}, {{technical}} and {{very long}} tags (within {{multiple issues}}) to article (TW)← Previous edit | Revision as of 01:18, 19 August 2012 edit undoLexein (talk | contribs)Extended confirmed users, Rollbackers17,577 edits + 2 in-depth sources, at top of refsNext edit → | ||
Line 1: | Line 1: | ||
{{multiple issues| | {{multiple issues| | ||
{{no footnotes|date=August 2012}} | {{no footnotes|date=August 2012}} | ||
{{ |
{{prose|date=August 2012}} | ||
{{very long|date=August 2012}} | {{very long|date=August 2012}} | ||
}} <!-- not too technical for users of mIRC. Needs prose. --> | |||
}} | |||
{{lowercase|title=mIRC Scripting Language}} | {{lowercase|title=mIRC Scripting Language}} | ||
Line 126: | Line 126: | ||
==References== | ==References== | ||
<!-- This are discussions in several books of the mIRC scripting language. Notable over a period of years. To be converted to inline citations.--> | <!-- This are discussions in several books of the mIRC scripting language. Notable over a period of years. To be converted to inline citations.--> | ||
* Smith, Chris. (2004). . Paul Mutton, ed. |
* Smith, Chris. (2004). . Paul Mutton, ed. O'Reilly Media, Inc. pp. 71-74. ''(In-depth example of script features and usage)'' | ||
* Jose Nazario (2004). Artech House, 2004. p. 53, 55. ''(Discusses 1997 mIRC script attack.)'' | |||
*Ken Dunham, Jim Melnick (2008) . CRC Press. p. 7-31. ''(In-depth analysis/reverse engineering of mIRC-script-based malware bot)'' | |||
* Peter Szor (2005). . Pearson Education. Ch. 3.7.7. | * Peter Szor (2005). . Pearson Education. Ch. 3.7.7. |
Revision as of 01:18, 19 August 2012
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
Paradigm | Event-driven programming, Procedural programming |
---|---|
Designed by | Khaled Mardam-Bey |
Developer | Khaled Mardam-Bey |
First appeared | 1995 (1995) |
Typing discipline | Dynamic typing |
OS | Microsoft Windows |
License | Proprietary software |
Filename extensions | .mrc, .ini |
Website | http://mirc.com |
Major implementations | |
mIRC |
The mIRC scripting language, often unofficially abbreviated to 'mSL', is the scripting language embedded in mIRC, a popular IRC client for Windows.
Primary uses
- Channel and personal protection against any types of attacks (flooding, spamming, CTCP floods, etc.).
- Dialog windows can be created in mIRC to better serve user-compatibility.
- Popular mIRC dialog extensions include MDX (mIRC Dialog Extension) and DCX (Dialog Control Extension). There are also a few versions of mdx.dll and dcx.dll modded by IRC hackers.
- Bots that provide automated IRC channel management, trivia or other games, and other desired functions for chatters.
- Commands that save typing or otherwise simplify life on IRC (such as automatically identifying as the owner of a nickname).
Script storage
Scripts are stored as either plain text files, usually with a .mrc file extension, or as INI files. They however can be stored with any extension. It can be: .exe, .script, etc. Multiple script files can be loaded at one time, although in some cases, one script will conflict with another and cause one or both of them to no longer work properly.
Language features
mIRC scripting involves a peculiar nomenclature that is not entirely consistent with most of the rest of the programming world. (Most notably, the term identifier—which in most languages refers to the name of a variable or function (whether it returns a value or not)—in mIRC refers specifically to a value returning function.)
- Built-in functions are termed commands or, if they return a value, identifiers.
- Custom scripted functions are called aliases. Aliases that return a value are known as custom identifiers. Both are called from the command line or other parts of a script in the same ways as built-in commands and identifiers (and can even supersede them).
- Popups are scripted context menu items. Popups are called when they are selected by the user. The term originally referred to the menus—which pop up upon a right click. It is still used this way in the manual. But the user community (who tend not to read scripting manuals) took to calling the individual items popups—perhaps thinking of the colourful novelty actions that are popular with many users as pages of a popup book.
- Remotes are event-handling scripts. Remotes are called when the event they handle occurs.
- All variables are dynamically typed.
- mIRC scripts make use of sigils. Identifiers (whether custom or built-in) are preceded by
$
, binary variables are preceded by&
, and other variables (whether local or global) are preceded by%
. Commands and aliases are not preceded by any particular character (although when entered from a window's command line they must be preceded by the command prefix, usually/
).
File handling
- Scripts can read from and write to files ) |
/write
]
The above is intended for singular access to the file. Because each time you issue $read
or /write
you open and close the file for access.
Multiple accesses, during a loop for instance, is best handled through /fopen
, /fwrite
and /fclose
. Since this opens the file only once. In some cases /filter
and /savebuf
is an even more efficient (non scripted loop) method.
- Scripts can also copy and delete files.
Binary variables
- Contain unlimited (8192 bytes prior to mIRC 6.1) raw data
- Globally accessible via commands and identifiers
- Automatically unset when script returns control to mIRC (and not to another part of a script)
- Prefixed with
&
(e.g.&Variable
) - Cannot be accessed other than by
/bread
and/bwrite
, so these variables cannot be passed onto other parts of the script
Hash tables
- May contain unlimited binary data or up to 4,150 (950 prior to mIRC 6.32) bytes of plain text. This limit is imposed by mIRC's scripting parser's own line length limitation (unless assigning a binary variable)
- Globally accessible via commands and identifiers
- Automatically unset when exiting mIRC as they are only stored in memory
- Can be saved for later use
- Not prefixed
- Faster than accessing from a file, as hash tables are stored in memory rather than the hard disk
- Size limited only by the computer's memory limits.
- Allows any bucket size to be used
Global variables
- May contain up to 4,150 (950 prior to mIRC 6.32) bytes of data including its name (however due to line-length limitations in mIRC's scripting parser, a maximum of 4,146 bytes can be assigned explicitly using /set or /var — this number decreasing as the variable's name grows longer)
- Cannot store NUL (ASCII 0) or trailing spaces
- Globally accessible
- Do not automatically unset unless a switch is used (stored automatically in a mIRC initialization file)
- Prefixed with
%
(e.g.%Variable
) - Created using the
set
command orvar -g
or%Variable = value
notation
Local variables
- May contain up to 4,150 (950 prior to mIRC 6.32) bytes of data including the variable name (however due to line-length limitations in mIRC's scripting parser, a maximum of 4,146 bytes can be assigned explicitly using the /set or /var commands — this number decreasing as the variable's name grows longer)
- Can store NUL (ASCII 0) or trailing spaces
- Are destroyed when the triggered alias or event ends
- Prefixed with
%
(e.g.%Variable
) - Created using the
var
command.var
is merely an internal alias forset -l
butvar
poses the means to declare multiple local variables on a single line (e.g.var %a = 1, %b, %c = 2
)
Limitations
- Scripting parser only supports a maximum of 4,150 (950 prior to mIRC 6.32) characters per line (not including newlines or indentation).
- Strings are not syntactically enclosed, creating ambiguities in code where characters meant as literal strings are treated as part of the language's syntax.
- Each line of code is broken down into a set of space-delimited tokens. As mIRC's parser does not support null tokens and the language doesn't provide a syntax to clearly differentiate literal strings from code; Prior to mIRC version 6.2 it was impossible to pass multiple consecutive spaces to any command or alias. However, this was fixed with the introduction of the returnex command which allows the preservation of spaces.
Code examples
The code below is in the remote scripts format. If placed into an alias file, the command names should not be preceded by the word "alias
". Test Comments include the common /* comment */
and ;comment
.
Here is an example of a Hello World alias:
;Defines the alias 'hello' in the remote script ;Note: if this is placed in an alias script, the 'alias' part must be removed (result: hello {) ;Usage: /hello alias hello { ;Displays(/echo) 'Hello World!' into the active window(-a) echo -a Hello World! }
A remote script to automatically respond to certain text
;Placed in a remote script ;When a user types Hello! in a channel, you answer back: Hello, ! on *:TEXT:Hello!:#:{ msg $chan Hello, $nick $+ ! } ;When a user types Hello! in a private message, you answer back: Hello, ! on *:TEXT:Hello!:?: { msg $nick Hello, $nick $+ ! } ;Here is a script which automatically give's voice to a user who joins a particular channel(The Bot or user should have HOP) on *:JOIN:#?: { mode $chan +v $nick }
See also
References
- Smith, Chris. (2004). "Hack #20 Automate IRC with Scripting" in IRC Hacks: 100 Industrial-Strength Tips & Tools. Paul Mutton, ed. O'Reilly Media, Inc. pp. 71-74. (In-depth example of script features and usage)
- Jose Nazario (2004)Defense and Detection Strategies Against Internet Worms. Artech House, 2004. p. 53, 55. (Discusses 1997 mIRC script attack.)
- Ken Dunham, Jim Melnick (2008) Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet. CRC Press. p. 7-31. (In-depth analysis/reverse engineering of mIRC-script-based malware bot)
- Peter Szor (2005). The Art of Computer Virus Research and Defense. Pearson Education. Ch. 3.7.7.
- David Harley, Robert S. Vibert (2007). AVIEN Malware Defense Guide for the Enterprise. Elsevier. p. 147. (usage in script attacks)
- Esharenana E. Adomi (2008). Security and Software for Cybercafés. Idea Group Inc (IGI). p. 173.
- Markus Jakobsson, Zulfikar Ramzan. (2008). Crimeware: Understanding New Attacks and Defenses. Addison-Wesley Professional. p. 194.
- Diane A. Coyle (2012). e-Study Guide for: Computers Are Your Future: Introductory. Content Technologies. part 170. ISBN 9780137146932.
External links
- Official mIRC website
- Template:Dmoz
- mIRC Online Manual — documentation in single-page HTML format
Internet Relay Chat (IRC) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Common terms | |||||||||||||||||
Related protocols | |||||||||||||||||
Networks | |||||||||||||||||
Technology | |||||||||||||||||
See also | |||||||||||||||||
Clients |
| ||||||||||||||||
Category |