Haha .. This item is fresh. Via: http://hi.baidu.com/secbug/Code:<form><labelfortarget>target</label><br/><inputtypetextnametargetvaluewww.gnucitizen.
Haha .. This item is fresh.
Via:Http://hi.baidu.com/secbug/
Code:
Script
Var AttackAPI = {
Version: 0.1,
Author: Petko Petkov (effecect ),
Homepage: http://www.gnucitizen.org };
AttackAPI. portshares = {};
AttackAPI. portport. scanPort = function (callback, target, port, timeout ){
Var timeout = (timeout = null )? 100: timeout;
Var img = new Image ();
Img. onerror = function (){
If (! Img) return;
Img = undefined;
Callback (target, port, open );
};
Img. onload = img. onerror;
Img. src = http: // + target ++: + port;
SetTimeout (function (){
If (! Img) return;
Img = undefined;
Callback (target, port, closed );
}, Timeout );
};
AttackAPI. portmask. scanTarget = function (callback, target, ports, timeout)
{
For (index = 0; index <ports. length; index ++)
AttackAPI. portport. scanPort (callback, target, ports [index], timeout );
};
Script
Script
Var result = document. getElementById (result );
Var callback = function (target, port, status ){
Result. value + = target +: + port ++ status + "";
};
Var scan = function (form ){
AttackAPI. porttarget. scanTarget (callback, form.tar get. value, form. port. value. split (,), form. timeout. value );
};
Script