Re: Spyware/adware and Internet Explorer
From: Steven Burn (services_at_it-mate.co.uk)
Date: Tue, 3 Feb 2004 15:47:49 -0000
Frode <news@mascot.REMOVETOREPLY.dyndns.org> wrote in message
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> Steven Burn wrote:
> >There are plenty of examples on places such as;
> A search for exploit in asp/vbscript gives 1 hit. The same goes for
> A search for the word "exploit" gives 6 hits. None of which are terribly
> relevant. A general google search for "asp exploits" does give some hits,
> most of which seem to concern server, not client, compromise. Rather
> logical given the nature of ASP as far I'm aware of its purpose
> (server-side scripting).
> Not a single hit on search for the word exploit.
> >Along with a ton of others
> Anything concrete? None of those sites have obvious sections covering
> of concept for browser-independent exploits.
> I was thinking more along the lines of an example of a working exploit
> covertly installs a payload. You can google up a bunch of sites with
> examples of working IE exploits to click. None of which I've gotten to do
> anything malicious outside of IE. Just give me one concrete place to go
> find a browser independent exploit I can click and see the effects of.
> - --
> -----BEGIN PGP SIGNATURE-----
> Version: PGP 8.0.3
> -----END PGP SIGNATURE-----
developer, so the following is pseudo code only).
function exec (command)
Some light research for you.........
Some light reading for you (hope you have a few hours)
The website's I mentioned WILL NOT list them as exploits simply because they
are exploits (I'd have thought that was common knowledge).
-- Regards Steven Burn Ur I.T. Mate Group www.it-mate.co.uk Keeping it FREE! Disclaimer: I know I'm probably wrong, I just like taking part ;o)