1583, 14/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   koresong
   °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß

http://www.hackerschool.org/HS_Boards/zboard.php?desc=desc&no=888 [º¹»ç]


  ###  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß ###


IE6¿¡ XP SP2¸¦ ´ë»óÀ¸·Î ÀÛ¼ºµÈ PoC (Proof of Concept) Äڵ尡 ¸ð »çÀÌÆ®¿¡ °ø°³µÇ¾ú½À´Ï´Ù.
°õÇ÷¹À̾ ¼³Ä¡µÈ »óÅ¿¡¼­ ÀÎÅÍ³Ý ÀͽºÇ÷η¯¸¦ »ç¿ëÇϽô ºÐµéÀº ´çºÐ°£ À¥ ¼­ÇÎÇÏ½Ç ¶§
ÁÖÀÇÇϽñ⠹ٶø´Ï´Ù. °Ô½Ã¹°À» À߸ø Ŭ¸¯Çϸé ÀÌ»óÇÑ ÇÁ·Î±×·¥ÀÌ ´Ù¿î·ÎµåµÇ¾î ½ÇÇàµÉ ¼ö ÀÖ½À´Ï´Ù.
ActiveX¸¦ ÀÌ¿ëÇÑ °ø°ÝÀ̹ǷΠActiveX¸¦ Áö¿øÇÏÁö ¾Ê´Â ºê¶ó¿ìÀú¸¦ »ç¿ëÇÒ °æ¿ì ¾ÈÀüÇÕ´Ï´Ù.

¾Æ·¡´Â ÇØ´ç PoC ÄÚµåÀÇ ÁÖ¼®ºÎºÐÀÔ´Ï´Ù.

GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer
overflow poc exploit (ie6/xp sp2)

quote from Wikipedia: "GOM Player(Gretech Online Movie Player) is South
Korea's most popular media player; as of July 2007, it had 8.4 million users,
compared to 5.4 million of Microsoft's Windows Media Player. Users most
commonly use the player to watch pornography..."
mphhh ...

passing more than 506 "A" to OpenUrl method:

EAX 00000000
ECX 7C80240F kernel32.7C80240F
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 00000000
ESP 0012CDD0 ASCII "AAAAAAAAAAAAAAAAAA...
EBP 0012DE08
ESI 003390B0
EDI 0000102A
EIP 41414141

object safety report:
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data
IPersist Safe:  Safe for untrusted: caller,data
IPStorage Safe:  Safe for untrusted: caller,data

software site: http://www.gomplayer.com/main.html

rgod
site: http://retrogod.altervista.org

==================================================

ÀÌ·¸´Ù°í ÇÕ´Ï´Ù

»ç¿ëÇϽôºеéÀº ÁÖÀÇÇØÁÖ¼¼¿ä~

(Æß±ÛÀÔ´Ï´Ù)

  Hit : 10706     Date : 2007/11/01 02:46



    
qkreoghks00 ¼Ò½ºÄڵ尡 ÀÌÇØ°¡ µÇ¾ß ½É°¢¼ºÀ» ±ú´ÝÁÒ;; Çؼ®ÀÌ¶óµµ ÇØÁֽǺÐ~ 2007/11/01  
image554 °õ Ç÷¹À̾ ½ÇÇàµÈ ÄÄÇ»ÅÍ¿¡¼­ ¿¢Æ¼ºê¿¢½º¸¦ ½ÇÇàÇÒ ¼öÀÖ´Â ºê¶ó¿ìÁ®·Î À§ ¼Ò½º¸¦ ·ÎµåÇÏ°Ô µÇ¸é, »ç¿ëÀÚÀÇ ÄÄÇ»ÅÍ¿¡ ÇØÄ¿°¡ ÀǵµÇÑ ÇÁ·Î±×·¥À» ½ÇÇàÇÒ ¼ö ÀÖ½À´Ï´Ù.. 2007/11/02
image554 À§¿¡´Â ½ÇÁ¦ ÄÚµå´Â ¾ø³×¿ä.. ¾¾Å¥´Ï¾Æ¿¡ °¡½Ã¸é exploitÄڵ嵵 °ø°³µÇ¾î ÀÖ½À´Ï´Ù! 2007/11/02
¼Û½Ã overflow remote attack 2007/11/02  
È£¸®¿¡À¯ÀÌ 2.1.6.3499 ¹öÀü ¾ê±â±º¿ä. ±×·³ 2.1.8.3683 ¹öÀüÀº¿ä? 2007/11/05  
¤©¤© ±×·¯´Ï±î firefox°¡ ÁÁ½À´Ï´Ù. IE´Â ´çÀå ¹ö¸®¼¼¿ä 2007/11/11
°ËÀº¿ù¾Æ passing more than 506 "A".. ¾Ð¹ÚÀÌ³×¿ä ¤»¤» 2007/11/29  
jin1055 ¾Æ¹«·¡µµ IEÃÊ´ëÇü°³ÆíÀÌ ÇÊ¿äÇÏ°Ú³×;;; 2007/12/12  
moongchiza ¹Ð¿ú°¡½Ã¸é °ø°³µÇ¾îÀִµ¥ °øºÎÁ» ÇÏ¼Å¾ßµÊ ¤¾¤¾ 2007/12/26  
1323   [Æß]¸®´ª½º¸¦ »ç¿ëÇÏ´Â ÄÄÇ»ÅÍ¿¡¼­ÀÇ ¹«¼±·£ ¼³Ä¡¹ý[2]     idl0521
09/24 10738
1322   geniusevilÀÇ °¡º­¿î c¾ð¾î ¹è¿ì±â 1[30]     geniusevil
01/06 10729
1321   ¾î¼Àºí¸®¾î °­Á 7Æí ¸¶Áö¸·¿ä ¤¾¤¾[2]     asdzxc301
12/13 10718
1320   ¾î¼Àºí¸®¾î ÃÑÁ¤¸® °­ÁÂ[8]     gnsehfvlr
05/09 10711
1319   ȨÆäÀÌÁö Ãë¾àÁ¡ Á¡°Ë ¹× Á¶Ä¡¹æ¹ý#1     whqkdnf000
01/01 10705
  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß[9]     koresong
11/01 10705
1317   ¸®¸ðÆ®¿¡¼­ ¸í·É¾î ½ÇÇà½ÃÅ°±â[1]     xiangyi
02/03 10693
1316   UDP¿Í TCP     gnsehfvlr
05/06 10674
1315   C¾ð¾î ¹®¹ý 3 (ÀÀ¿ë : scanfÀÇ ¸ô¶ú´ø±â´É)[7]     Acacia
02/15 10656
1314   ½Éº¼¸¯ ¸µÅ©°É±â~¡Ù¤»[1]     ±«µµjs
07/25 10655
1313   XPÀÇ Àâ´ÙÇÑ ÇÊ¿ä¾ø´Â ¼­ºñ½ºµé ²ô±â!![3]     kgt2001sus
12/13 10643
1312   Webhacking.kr 12¹ø ¹®Á¦[4]     Ǫ¸¥ÇÏ´Ã
04/02 10636
1311   ÇØÅ·ÇÒ¶§ ¿ì¼± ÀÌÇØÇؾßÇÒÁ¡.;;(°Á Á¦°¡ ¾Æ´Â°Å¿¡¿ä./.;;)[21]     H.R.T
12/14 10626
1310   ÇØÅ·Åø[5]     bongcheur
07/08 10619
1309   [ÀÚÀÛ] ¿ìºÐÅõ¿¡¼­ ÄܼÖâÀ¸·Î ºÎÆÃÇϱâ[3]     µµ±úºñ¼±»ý
03/04 10610
1308   - [ÇØÅ·±â¹ý] HTTP Session Hijacking[1]     twinz
08/28 10600
1307   [802.11] Dynamic WEP !!!!![4]     DCos
02/21 10587
1306   chenkim4ÀÇ SYN FLOODER¼Ò½º ÄÚµåÆí     chenkim4
08/28 10584
1305   ;cat À» »ç¿ëÇÏ´Â ÀÌÀ¯ .[3]     bugfixer2
05/18 10574
1304   8¹ø°c°­ÁÂ[14]     ±«µµjs
07/15 10571
[1]..[11][12][13] 14 [15][16][17][18][19][20]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org