1581, 19/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   koresong
   °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=888 [º¹»ç]


  ###  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß ###


IE6¿¡ XP SP2¸¦ ´ë»óÀ¸·Î ÀÛ¼ºµÈ PoC (Proof of Concept) Äڵ尡 ¸ð »çÀÌÆ®¿¡ °ø°³µÇ¾ú½À´Ï´Ù.
°õÇ÷¹À̾ ¼³Ä¡µÈ »óÅ¿¡¼­ ÀÎÅÍ³Ý ÀͽºÇ÷η¯¸¦ »ç¿ëÇϽô ºÐµéÀº ´çºÐ°£ À¥ ¼­ÇÎÇÏ½Ç ¶§
ÁÖÀÇÇϽñ⠹ٶø´Ï´Ù. °Ô½Ã¹°À» À߸ø Ŭ¸¯Çϸé ÀÌ»óÇÑ ÇÁ·Î±×·¥ÀÌ ´Ù¿î·ÎµåµÇ¾î ½ÇÇàµÉ ¼ö ÀÖ½À´Ï´Ù.
ActiveX¸¦ ÀÌ¿ëÇÑ °ø°ÝÀ̹ǷΠActiveX¸¦ Áö¿øÇÏÁö ¾Ê´Â ºê¶ó¿ìÀú¸¦ »ç¿ëÇÒ °æ¿ì ¾ÈÀüÇÕ´Ï´Ù.

¾Æ·¡´Â ÇØ´ç PoC ÄÚµåÀÇ ÁÖ¼®ºÎºÐÀÔ´Ï´Ù.

GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer
overflow poc exploit (ie6/xp sp2)

quote from Wikipedia: "GOM Player(Gretech Online Movie Player) is South
Korea's most popular media player; as of July 2007, it had 8.4 million users,
compared to 5.4 million of Microsoft's Windows Media Player. Users most
commonly use the player to watch pornography..."
mphhh ...

passing more than 506 "A" to OpenUrl method:

EAX 00000000
ECX 7C80240F kernel32.7C80240F
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 00000000
ESP 0012CDD0 ASCII "AAAAAAAAAAAAAAAAAA...
EBP 0012DE08
ESI 003390B0
EDI 0000102A
EIP 41414141

object safety report:
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data
IPersist Safe:  Safe for untrusted: caller,data
IPStorage Safe:  Safe for untrusted: caller,data

software site: http://www.gomplayer.com/main.html

rgod
site: http://retrogod.altervista.org

==================================================

ÀÌ·¸´Ù°í ÇÕ´Ï´Ù

»ç¿ëÇϽôºеéÀº ÁÖÀÇÇØÁÖ¼¼¿ä~

(Æß±ÛÀÔ´Ï´Ù)

  Hit : 10666     Date : 2007/11/01 02:46



    
qkreoghks00 ¼Ò½ºÄڵ尡 ÀÌÇØ°¡ µÇ¾ß ½É°¢¼ºÀ» ±ú´ÝÁÒ;; Çؼ®ÀÌ¶óµµ ÇØÁֽǺÐ~ 2007/11/01  
image554 °õ Ç÷¹À̾ ½ÇÇàµÈ ÄÄÇ»ÅÍ¿¡¼­ ¿¢Æ¼ºê¿¢½º¸¦ ½ÇÇàÇÒ ¼öÀÖ´Â ºê¶ó¿ìÁ®·Î À§ ¼Ò½º¸¦ ·ÎµåÇÏ°Ô µÇ¸é, »ç¿ëÀÚÀÇ ÄÄÇ»ÅÍ¿¡ ÇØÄ¿°¡ ÀǵµÇÑ ÇÁ·Î±×·¥À» ½ÇÇàÇÒ ¼ö ÀÖ½À´Ï´Ù.. 2007/11/02
image554 À§¿¡´Â ½ÇÁ¦ ÄÚµå´Â ¾ø³×¿ä.. ¾¾Å¥´Ï¾Æ¿¡ °¡½Ã¸é exploitÄڵ嵵 °ø°³µÇ¾î ÀÖ½À´Ï´Ù! 2007/11/02
¼Û½Ã overflow remote attack 2007/11/02  
È£¸®¿¡À¯ÀÌ 2.1.6.3499 ¹öÀü ¾ê±â±º¿ä. ±×·³ 2.1.8.3683 ¹öÀüÀº¿ä? 2007/11/05  
¤©¤© ±×·¯´Ï±î firefox°¡ ÁÁ½À´Ï´Ù. IE´Â ´çÀå ¹ö¸®¼¼¿ä 2007/11/11
°ËÀº¿ù¾Æ passing more than 506 "A".. ¾Ð¹ÚÀÌ³×¿ä ¤»¤» 2007/11/29  
jin1055 ¾Æ¹«·¡µµ IEÃÊ´ëÇü°³ÆíÀÌ ÇÊ¿äÇÏ°Ú³×;;; 2007/12/12  
moongchiza ¹Ð¿ú°¡½Ã¸é °ø°³µÇ¾îÀִµ¥ °øºÎÁ» ÇÏ¼Å¾ßµÊ ¤¾¤¾ 2007/12/26  
1221   °¢ ¶ó¿ìÅÍ µðÆúÆ® ºñ¹ø     ROK.AF
02/09 29588
1220   °¡Â¥¹é½Å µîÀå!!!(¾È·¦¿¡¼­ Æß)[2]     dkdkfjgh
12/03 6944
1219   °¡Â¥¹é½Å (2)[1]     dkdkfjgh
12/16 8086
1218   °ü¸®ÀÚ´Ô ÀÖ±ä ÇÑ°¡¿ä??[1]     rabbitlycat
04/30 5475
1217   °ü¸®ÀÚ´Ô ÀúÁ» µµ¿ÍÁÖ½ÃÁÒ~ ¸Þ½ÅÁ® µÇ½Ã³ª¿ä>[14]     upup09
05/31 6801
1216   °ü·Ã Á¤º¸µµ ¾îµð¼­ ¾òÀ» ¼ö ÀÖ´ÂÁö?[1]     39ghwjd
09/12 5484
1215   °Ô½ÃÆÇ¿¡ ÆÄÀÏ ¿Ã·Á¼­ ÇØÅ·Çϱâ[4]     gohy032
07/05 8300
1214   °Ô½ÃÆÇÀÌ ¿À·ùÀΰ¡¿ä?[1]     siwall27
01/04 7488
  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß[9]     koresong
11/01 10665
1212   °ÔÀ¸¸¥ ÇÁ·Î±×·¡¸ÓÀÇ ÇÁ¸®¼­¹ö Á¤º¹±â[5]     programmer00
02/24 7917
1211   °ÔÀÓ ÇØÅ·[1]     dkdkfjgh
11/14 9152
1210   °í¼ö´ÔµéÀÇ µµ¿òÀ» ¹Þ°í ½Í½À´Ï´Ù     vbnm111
02/11 224
1209   °íµîÇб³ ¸¸È­ [¿ÀÅäÇαâ¹Ý] ÇØÄðÁ¢¼Ó±â?[5]     ÃÖ¼±È£
12/07 8417
1208   °íÁ¹·Î Á¤º¸º¸È£ÂÊÀ¸·Î °¡´Â¹æ¹ýÀÌÀÖÀ»±î¿ä?      dnflxoghks
11/08 7417
1207   ¤» ÄÄÅÍ ºü¸£°Ô Çϴ¹æ¹ý?[1]     ¹«¼ÒÀ¯
12/17 9122
1206   ¤·¤µ¤¸?     rabbitlycat
05/08 5467
1205   ¤·[3]     ksmfou98
09/17 5951
1204   ¤§¤§¤§[1]     luluheewon
09/23 4758
1203   ¡Ú¡Ú¡Ú[À¯´Ð½º ¼­¹ö¿ë CVS ±¸Ãà±â]¡Ú¡Ú¡Ú     challker
12/27 8716
1202   ¡éº¸Ãæ. ¿Ã¹Ù¸¥ °Ë»ö Á¶°ÇÀ¸·Î, find¸í·É¾î¸¦ »ç¿ëÇÏÀÚ.[13]     yl
09/09 13882
[1]..[11][12][13][14][15][16][17][18] 19 [20]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org