1581, 14/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   koresong
   °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=888 [º¹»ç]


  ###  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß ###


IE6¿¡ XP SP2¸¦ ´ë»óÀ¸·Î ÀÛ¼ºµÈ PoC (Proof of Concept) Äڵ尡 ¸ð »çÀÌÆ®¿¡ °ø°³µÇ¾ú½À´Ï´Ù.
°õÇ÷¹À̾ ¼³Ä¡µÈ »óÅ¿¡¼­ ÀÎÅÍ³Ý ÀͽºÇ÷η¯¸¦ »ç¿ëÇϽô ºÐµéÀº ´çºÐ°£ À¥ ¼­ÇÎÇÏ½Ç ¶§
ÁÖÀÇÇϽñ⠹ٶø´Ï´Ù. °Ô½Ã¹°À» À߸ø Ŭ¸¯Çϸé ÀÌ»óÇÑ ÇÁ·Î±×·¥ÀÌ ´Ù¿î·ÎµåµÇ¾î ½ÇÇàµÉ ¼ö ÀÖ½À´Ï´Ù.
ActiveX¸¦ ÀÌ¿ëÇÑ °ø°ÝÀ̹ǷΠActiveX¸¦ Áö¿øÇÏÁö ¾Ê´Â ºê¶ó¿ìÀú¸¦ »ç¿ëÇÒ °æ¿ì ¾ÈÀüÇÕ´Ï´Ù.

¾Æ·¡´Â ÇØ´ç PoC ÄÚµåÀÇ ÁÖ¼®ºÎºÐÀÔ´Ï´Ù.

GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer
overflow poc exploit (ie6/xp sp2)

quote from Wikipedia: "GOM Player(Gretech Online Movie Player) is South
Korea's most popular media player; as of July 2007, it had 8.4 million users,
compared to 5.4 million of Microsoft's Windows Media Player. Users most
commonly use the player to watch pornography..."
mphhh ...

passing more than 506 "A" to OpenUrl method:

EAX 00000000
ECX 7C80240F kernel32.7C80240F
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 00000000
ESP 0012CDD0 ASCII "AAAAAAAAAAAAAAAAAA...
EBP 0012DE08
ESI 003390B0
EDI 0000102A
EIP 41414141

object safety report:
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data
IPersist Safe:  Safe for untrusted: caller,data
IPStorage Safe:  Safe for untrusted: caller,data

software site: http://www.gomplayer.com/main.html

rgod
site: http://retrogod.altervista.org

==================================================

ÀÌ·¸´Ù°í ÇÕ´Ï´Ù

»ç¿ëÇϽôºеéÀº ÁÖÀÇÇØÁÖ¼¼¿ä~

(Æß±ÛÀÔ´Ï´Ù)

  Hit : 10682     Date : 2007/11/01 02:46



    
qkreoghks00 ¼Ò½ºÄڵ尡 ÀÌÇØ°¡ µÇ¾ß ½É°¢¼ºÀ» ±ú´ÝÁÒ;; Çؼ®ÀÌ¶óµµ ÇØÁֽǺÐ~ 2007/11/01  
image554 °õ Ç÷¹À̾ ½ÇÇàµÈ ÄÄÇ»ÅÍ¿¡¼­ ¿¢Æ¼ºê¿¢½º¸¦ ½ÇÇàÇÒ ¼öÀÖ´Â ºê¶ó¿ìÁ®·Î À§ ¼Ò½º¸¦ ·ÎµåÇÏ°Ô µÇ¸é, »ç¿ëÀÚÀÇ ÄÄÇ»ÅÍ¿¡ ÇØÄ¿°¡ ÀǵµÇÑ ÇÁ·Î±×·¥À» ½ÇÇàÇÒ ¼ö ÀÖ½À´Ï´Ù.. 2007/11/02
image554 À§¿¡´Â ½ÇÁ¦ ÄÚµå´Â ¾ø³×¿ä.. ¾¾Å¥´Ï¾Æ¿¡ °¡½Ã¸é exploitÄڵ嵵 °ø°³µÇ¾î ÀÖ½À´Ï´Ù! 2007/11/02
¼Û½Ã overflow remote attack 2007/11/02  
È£¸®¿¡À¯ÀÌ 2.1.6.3499 ¹öÀü ¾ê±â±º¿ä. ±×·³ 2.1.8.3683 ¹öÀüÀº¿ä? 2007/11/05  
¤©¤© ±×·¯´Ï±î firefox°¡ ÁÁ½À´Ï´Ù. IE´Â ´çÀå ¹ö¸®¼¼¿ä 2007/11/11
°ËÀº¿ù¾Æ passing more than 506 "A".. ¾Ð¹ÚÀÌ³×¿ä ¤»¤» 2007/11/29  
jin1055 ¾Æ¹«·¡µµ IEÃÊ´ëÇü°³ÆíÀÌ ÇÊ¿äÇÏ°Ú³×;;; 2007/12/12  
moongchiza ¹Ð¿ú°¡½Ã¸é °ø°³µÇ¾îÀִµ¥ °øºÎÁ» ÇÏ¼Å¾ßµÊ ¤¾¤¾ 2007/12/26  
1321   [802.11] 802.11 Frame [ (1) -Frame Control- ][3]     DCos
04/27 10710
1320   geniusevilÀÇ °¡º­¿î c¾ð¾î ¹è¿ì±â 1[30]     geniusevil
01/06 10702
1319   ¾î¼Àºí¸®¾î °­Á 7Æí ¸¶Áö¸·¿ä ¤¾¤¾[2]     asdzxc301
12/13 10691
1318   ¾î¼Àºí¸®¾î ÃÑÁ¤¸® °­ÁÂ[8]     gnsehfvlr
05/09 10687
  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß[9]     koresong
11/01 10681
1316   ¸®¸ðÆ®¿¡¼­ ¸í·É¾î ½ÇÇà½ÃÅ°±â[1]     xiangyi
02/03 10668
1315   ȨÆäÀÌÁö Ãë¾àÁ¡ Á¡°Ë ¹× Á¶Ä¡¹æ¹ý#1     whqkdnf000
01/01 10665
1314   UDP¿Í TCP     gnsehfvlr
05/06 10645
1313   C¾ð¾î ¹®¹ý 3 (ÀÀ¿ë : scanfÀÇ ¸ô¶ú´ø±â´É)[7]     Acacia
02/15 10632
1312   XPÀÇ Àâ´ÙÇÑ ÇÊ¿ä¾ø´Â ¼­ºñ½ºµé ²ô±â!![3]     kgt2001sus
12/13 10614
1311   Webhacking.kr 12¹ø ¹®Á¦[4]     Ǫ¸¥ÇÏ´Ã
04/02 10613
1310   ½Éº¼¸¯ ¸µÅ©°É±â~¡Ù¤»[1]     ±«µµjs
07/25 10611
1309   ÇØÅ·ÇÒ¶§ ¿ì¼± ÀÌÇØÇؾßÇÒÁ¡.;;(°Á Á¦°¡ ¾Æ´Â°Å¿¡¿ä./.;;)[21]     H.R.T
12/14 10602
1308   ÇØÅ·Åø[5]     bongcheur
07/08 10590
1307   [ÀÚÀÛ] ¿ìºÐÅõ¿¡¼­ ÄܼÖâÀ¸·Î ºÎÆÃÇϱâ[3]     µµ±úºñ¼±»ý
03/04 10581
1306   - [ÇØÅ·±â¹ý] HTTP Session Hijacking[1]     twinz
08/28 10570
1305   [802.11] Dynamic WEP !!!!![4]     DCos
02/21 10556
1304   chenkim4ÀÇ SYN FLOODER¼Ò½º ÄÚµåÆí     chenkim4
08/28 10550
1303   ;cat À» »ç¿ëÇÏ´Â ÀÌÀ¯ .[3]     bugfixer2
05/18 10549
1302   8¹ø°c°­ÁÂ[14]     ±«µµjs
07/15 10538
[1]..[11][12][13] 14 [15][16][17][18][19][20]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org