1581, 61/80 ȸ¿ø°¡ÀÔ  ·Î±×ÀΠ 
   koresong
   °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß

http://www.hackerschool.org/HS_Boards/zboard.php?id=Free_Lectures&no=888 [º¹»ç]


  ###  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß ###


IE6¿¡ XP SP2¸¦ ´ë»óÀ¸·Î ÀÛ¼ºµÈ PoC (Proof of Concept) Äڵ尡 ¸ð »çÀÌÆ®¿¡ °ø°³µÇ¾ú½À´Ï´Ù.
°õÇ÷¹À̾ ¼³Ä¡µÈ »óÅ¿¡¼­ ÀÎÅÍ³Ý ÀͽºÇ÷η¯¸¦ »ç¿ëÇϽô ºÐµéÀº ´çºÐ°£ À¥ ¼­ÇÎÇÏ½Ç ¶§
ÁÖÀÇÇϽñ⠹ٶø´Ï´Ù. °Ô½Ã¹°À» À߸ø Ŭ¸¯Çϸé ÀÌ»óÇÑ ÇÁ·Î±×·¥ÀÌ ´Ù¿î·ÎµåµÇ¾î ½ÇÇàµÉ ¼ö ÀÖ½À´Ï´Ù.
ActiveX¸¦ ÀÌ¿ëÇÑ °ø°ÝÀ̹ǷΠActiveX¸¦ Áö¿øÇÏÁö ¾Ê´Â ºê¶ó¿ìÀú¸¦ »ç¿ëÇÒ °æ¿ì ¾ÈÀüÇÕ´Ï´Ù.

¾Æ·¡´Â ÇØ´ç PoC ÄÚµåÀÇ ÁÖ¼®ºÎºÐÀÔ´Ï´Ù.

GOM Player 2.1.6.3499 GomWeb Control (GomWeb3.dll 1.0.0.12) remote buffer
overflow poc exploit (ie6/xp sp2)

quote from Wikipedia: "GOM Player(Gretech Online Movie Player) is South
Korea's most popular media player; as of July 2007, it had 8.4 million users,
compared to 5.4 million of Microsoft's Windows Media Player. Users most
commonly use the player to watch pornography..."
mphhh ...

passing more than 506 "A" to OpenUrl method:

EAX 00000000
ECX 7C80240F kernel32.7C80240F
EDX 7C91EB94 ntdll.KiFastSystemCallRet
EBX 00000000
ESP 0012CDD0 ASCII "AAAAAAAAAAAAAAAAAA...
EBP 0012DE08
ESI 003390B0
EDI 0000102A
EIP 41414141

object safety report:
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe:  Safe for untrusted: caller,data
IPersist Safe:  Safe for untrusted: caller,data
IPStorage Safe:  Safe for untrusted: caller,data

software site: http://www.gomplayer.com/main.html

rgod
site: http://retrogod.altervista.org

==================================================

ÀÌ·¸´Ù°í ÇÕ´Ï´Ù

»ç¿ëÇϽôºеéÀº ÁÖÀÇÇØÁÖ¼¼¿ä~

(Æß±ÛÀÔ´Ï´Ù)

  Hit : 10703     Date : 2007/11/01 02:46



    
qkreoghks00 ¼Ò½ºÄڵ尡 ÀÌÇØ°¡ µÇ¾ß ½É°¢¼ºÀ» ±ú´ÝÁÒ;; Çؼ®ÀÌ¶óµµ ÇØÁֽǺÐ~ 2007/11/01  
image554 °õ Ç÷¹À̾ ½ÇÇàµÈ ÄÄÇ»ÅÍ¿¡¼­ ¿¢Æ¼ºê¿¢½º¸¦ ½ÇÇàÇÒ ¼öÀÖ´Â ºê¶ó¿ìÁ®·Î À§ ¼Ò½º¸¦ ·ÎµåÇÏ°Ô µÇ¸é, »ç¿ëÀÚÀÇ ÄÄÇ»ÅÍ¿¡ ÇØÄ¿°¡ ÀǵµÇÑ ÇÁ·Î±×·¥À» ½ÇÇàÇÒ ¼ö ÀÖ½À´Ï´Ù.. 2007/11/02
image554 À§¿¡´Â ½ÇÁ¦ ÄÚµå´Â ¾ø³×¿ä.. ¾¾Å¥´Ï¾Æ¿¡ °¡½Ã¸é exploitÄڵ嵵 °ø°³µÇ¾î ÀÖ½À´Ï´Ù! 2007/11/02
¼Û½Ã overflow remote attack 2007/11/02  
È£¸®¿¡À¯ÀÌ 2.1.6.3499 ¹öÀü ¾ê±â±º¿ä. ±×·³ 2.1.8.3683 ¹öÀüÀº¿ä? 2007/11/05  
¤©¤© ±×·¯´Ï±î firefox°¡ ÁÁ½À´Ï´Ù. IE´Â ´çÀå ¹ö¸®¼¼¿ä 2007/11/11
°ËÀº¿ù¾Æ passing more than 506 "A".. ¾Ð¹ÚÀÌ³×¿ä ¤»¤» 2007/11/29  
jin1055 ¾Æ¹«·¡µµ IEÃÊ´ëÇü°³ÆíÀÌ ÇÊ¿äÇÏ°Ú³×;;; 2007/12/12  
moongchiza ¹Ð¿ú°¡½Ã¸é °ø°³µÇ¾îÀִµ¥ °øºÎÁ» ÇÏ¼Å¾ßµÊ ¤¾¤¾ 2007/12/26  
381   ¡áHDD (ÇÏµå µð½ºÅ©) Layout ¼³Á¤[1]     BLu2Scr22n
01/24 6620
380   ¡éº¸Ãæ. ¿Ã¹Ù¸¥ °Ë»ö Á¶°ÇÀ¸·Î, find¸í·É¾î¸¦ »ç¿ëÇÏÀÚ.[13]     yl
09/09 13926
379   ¡Ú¡Ú¡Ú[À¯´Ð½º ¼­¹ö¿ë CVS ±¸Ãà±â]¡Ú¡Ú¡Ú     challker
12/27 8752
378   ¤§¤§¤§[1]     luluheewon
09/23 4804
377   ¤·[3]     ksmfou98
09/17 5985
376   ¤·¤µ¤¸?     rabbitlycat
05/08 5503
375   ¤» ÄÄÅÍ ºü¸£°Ô Çϴ¹æ¹ý?[1]     ¹«¼ÒÀ¯
12/17 9162
374   °íÁ¹·Î Á¤º¸º¸È£ÂÊÀ¸·Î °¡´Â¹æ¹ýÀÌÀÖÀ»±î¿ä?      dnflxoghks
11/08 7457
373   °íµîÇб³ ¸¸È­ [¿ÀÅäÇαâ¹Ý] ÇØÄðÁ¢¼Ó±â?[5]     ÃÖ¼±È£
12/07 8462
372   °í¼ö´ÔµéÀÇ µµ¿òÀ» ¹Þ°í ½Í½À´Ï´Ù     vbnm111
02/11 279
371   °ÔÀÓ ÇØÅ·[1]     dkdkfjgh
11/14 9179
370   °ÔÀ¸¸¥ ÇÁ·Î±×·¡¸ÓÀÇ ÇÁ¸®¼­¹ö Á¤º¹±â[5]     programmer00
02/24 7964
  °õÇÿ¡¼­ Ãë¾àÁ¡ÀÌ ¹ß°ß[9]     koresong
11/01 10702
368   °Ô½ÃÆÇÀÌ ¿À·ùÀΰ¡¿ä?[1]     siwall27
01/04 7519
367   °Ô½ÃÆÇ¿¡ ÆÄÀÏ ¿Ã·Á¼­ ÇØÅ·Çϱâ[4]     gohy032
07/05 8325
366   °ü·Ã Á¤º¸µµ ¾îµð¼­ ¾òÀ» ¼ö ÀÖ´ÂÁö?[1]     39ghwjd
09/12 5518
365   °ü¸®ÀÚ´Ô ÀúÁ» µµ¿ÍÁÖ½ÃÁÒ~ ¸Þ½ÅÁ® µÇ½Ã³ª¿ä>[14]     upup09
05/31 6834
364   °ü¸®ÀÚ´Ô ÀÖ±ä ÇÑ°¡¿ä??[1]     rabbitlycat
04/30 5512
363   °¡Â¥¹é½Å (2)[1]     dkdkfjgh
12/16 8123
362   °¡Â¥¹é½Å µîÀå!!!(¾È·¦¿¡¼­ Æß)[2]     dkdkfjgh
12/03 6967
[1].. 61 [62][63][64][65][66][67][68][69][70]..[80]

Copyright 1999-2024 Zeroboard / skin by Hackerschool.org / Secure Patch by Hackerschool.org